index
int64 0
4.08k
| text
stringlengths 34
4.9k
⌀ | url
stringclasses 38
values |
|---|---|---|
796
|
21.27. Searching Data in the Metaverse
Problem
You are troubleshooting and want to view a metaverse object.
Solution
You need to search the metaverse:
1. Open the Synchronization Service Manager.
2. Click the Metaverse Search button on the toolbar.
3. Click the Search button.
Records from the metaverse are returned in the Search Results pane.
4. Double-click a record in the Search Results pane.
5. You can see which MA contributed data to this metaverse object. If you doubleclick the object that you added a telephoneNumber to in AD, you should see its
attributes detailed in the pane below the Attributes tab.
6. Click the Connectors tab.
You can see which MAs this metaverse object is joined to.
Discussion
The Connectors tab highlights the difference between projection and provisioning. You
should see that the link between the metaverse object and the connector space entries
was created because of projection rules for the SQL Server MA and provisioning rules
for the AD MA. That is because you configured the SQL Server MA to project objects
to the metaverse, and then you wrote a rules extension to provision objects from the
metaverse to the AD connector space.
See Also
Recipe 21.26 for searching data in the connector space; TechNet: Create a Metaverse
Search Query
21.27. Searching Data in the Metaverse | 771
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
797
|
21.28. Deleting Data in the Connector Space
and Metaverse
Problem
You want to clear out the connector space or the metaverse, perhaps so that you can
perform another complete run-through of all these recipes to consolidate learning.
Solution
1. Open the Synchronization Service Manager.
2. Click the Metaverse Designer button on the toolbar.
3. In the Actions pane on the far-right side, click Configure Object Deletion Rule.
4. Ensure that the “Delete metaverse object when connector from this management
agent is disconnected” radio button is selected.
5. Place a checkmark next to the SQL Server MA in the list and then click OK.
6. Click the Management Agents button on the toolbar.
7. In the Management Agents pane, click the MA you wish to delete objects from—
do the AD MA first.
8. In the Actions pane on the far-right side, click Delete.
This is important: you risk deleting the whole MA if you do not
perform the following step correctly.
9. Ensure that the “Delete connector space only” radio button is selected.
10. When prompted that you are sure you want to delete the connector space, click Yes.
11. A message box will appear with details of how many records were deleted. Click
OK.
12. Perform steps 7–11 again on the HR Database MA.
Discussion
You configured the metaverse object deletion rule so that when objects from the SQL
Server MA were deleted, the related metaverse objects would also be deleted. That is
why you deleted objects from the AD MA first. When you performed steps 7–11 the
second time, the metaverse objects were also deleted. You can prove this by searching
the metaverse in between delete operations.
772 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
798
|
There is no metaverse delete; FIM ensures that objects in the metaverse always have a
join to at least one object in a connector space from at least one MA. The object deletion
rule is the configuration that tells FIM what to do with metaverse objects when con‐
nector space objects get deleted.
For more control, you can specify that a rules extension should be used to make the
decision for you.
It is impossible to end up in the situation where FIM has an object in the metaverse but
no corresponding object in any connector space.
See Also
TechNet: Configuring Management Agents
21.29. Extending Object Types to Include a New Attribute
Problem
You want to add a new attribute to an existing object type in the metaverse so that you
can hold data specific to your implementation.
Solution
1. Open the Synchronization Service Manager.
2. Click the Metaverse Designer button on the toolbar.
3. In the “Object type” pane, select the object type you wish to modify (e.g., Person).
4. In the lower Actions pane, click the Add Attribute listing.
5. In the Add Attribute To Object Type dialog box, click the “New attribute” button.
6. In the New Attribute dialog box, fill in the following properties:
a. Attribute name (the name of the attribute as you will see it in the metaverse
attributes list)
Choosing a nonindexed value will let you store a much larger
value here, but it cannot be indexed and should never be used
for purposes of a join.
b. Attribute type (the type of attribute data you can store; it defaults to String
(indexable))
c. Multi-values (check this if you intend this attribute to be multivalued)
21.29. Extending Object Types to Include a New Attribute | 773
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
799
|
d. Indexed (check this if you intend the value to be used during join operations)
7. Click the OK button twice to accept the changes.
Discussion
Once an attribute is created and attached to an object type, it can be linked to any other
object type by following steps 1–4 and then checking off the attribute(s) that you wish
to add. Choosing a multivalued attribute type will automatically configure the attribute
to also be indexed, if supported by the chosen attribute type.
21.30. Previewing Changes to the FIM Configuration
Problem
You want to make changes to one or more flows and you would like to confirm the exact
effect the change will have before you roll it out.
Solution
The solution involves the use of the Preview function, which is accessed as a property
of an individual connector space object:
1. Open the Synchronization Service Manager.
2. Locate the connector space object you would like to preview changes against by
using the recipe for searching the connector space—you need to pick the connector
in the MA that you would run the full or delta synchronization against.
3. On the Connector Space Object Properties dialog, click the Preview button (see
Figure 21-15).
774 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
800
|
Figure 21-15. Connector Space Object Properties dialog—Preview
4. On the Preview dialog, under the “Select preview mode” section, select between a
Full Synchronization or a Delta Synchronization; select the radio button accord‐
ingly and then click the Generate Preview button (see Figure 21-16).
5. In the contents pane, you can now browse each step and follow from Source Object
Details all the way through provisioning to Export Attribute flow on individual
connectors.
21.30. Previewing Changes to the FIM Configuration | 775
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
801
|
Figure 21-16. Preview dialog—Select preview mode
Discussion
Preview is one of the most useful aspects of the FIM product; it allows you to do what
if scenarios and ascertain the exact effect any configuration change will have on the state
of all identities. Incidentally, the Preview function is actually a side effect of basing FIM
on SQL Server. Under normal circumstances, any given run profile step is wrapped in
a SQL transaction (one transaction for every connector space object in the MA of the
run profile), and as each identity is converged across all connectors, that transaction is
committed to the database. In the event of an exception, only that transaction is rolled
back and the next identity is processed. Given this feature, the Preview ability simply
rolls back the transaction for the given object. This means that FIM is not simply sim‐
ulating what a run would look like; it’s actually executing the process exactly as it would
be under normal circumstances, with the exception that the changes are not committed.
Since Preview is executing every step and rolling back the transaction,
be extremely careful in your rules extensions that you are not perform‐
ing actions that can’t be undone. Anything you do through a rules ex‐
tension to any source outside of FIM will not be rolled back because it
is outside of the scope of the SQL transaction. You should use the
Utils.InPreviewMode() property to determine when you are in Pre‐
view mode, and gate certain functions of your flow.
776 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
802
|
See Also
TechNet: Using Metaverse Search
21.31. Committing Changes to Individual Identities Using
the Commit Preview Feature
Problem
You want to make changes to a rules extension or flow but you would like to confirm
the exact effect the change will have before you roll it out. In addition, you want to
commit the changes to only a handful of records that need the changes to go into effect
right away and you can’t afford to run a full synchronization to get them.
Solution
1. Open the Synchronization Service Manager.
2. Locate the connector space object you would like to preview changes against by
using the recipe for searching the connector space—you need to pick the connector
in the MA that you would run the full or delta synchronization against.
3. On the Connector Space Object Properties dialog, click the Preview button (see
Figure 21-15).
4. On the Preview dialog, under the Select preview mode section, select between a Full
Synchronization or a Delta Synchronization; select the radio button accordingly
and then click the Commit Preview button (see Figure 21-16).
5. In the contents pane, you can now browse each step and follow from Source Object
Details all the way through provisioning to Export Attribute flow on individual
connectors!
Discussion
Commit Preview functions like the Preview button; however, it actually commits the
transaction at the end for the given connector. This allows you to automatically apply
new policies to specific connectors; you should use this strategy only when you abso‐
lutely cannot afford (from a time perspective) to run a full sync. Using Commit Preview
during testing and certification is recommended when you want to follow a change
across data sources.
See Also
Recipe 21.26 for searching data in the connector space
21.31. Committing Changes to Individual Identities Using the Commit Preview Feature | 777
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
803
|
21.32. Passing Data Between Rules Extensions Using
Transaction Properties
Problem
You are tracking an event that occurs in an authoritative data source and want to pass
a message or a data element to one of the other extensions.
Solution
1. Open Visual Studio and open your rules extension project solution.
2. You first need to set a transaction property, and while these properties can be set
anywhere, you will most likely set them in ShouldProjectToMV, MapAttributes
ForJoin, ResolveJoinSearch, MapAttributesForImport, MapAttributesForEx
port, and Deprovision, or within the Provisioning rules extensions. The following
example shows two ways of setting different types of transaction properties:
' String
Dim strWF As String = "foobar"
Utils.TransactionProperties.Add("WORKFLOW", strWF)
' Boolean
Utils.TransactionProperties.Add("DELETE", True)
3. Once you have one or more properties set, you can query for them elsewhere:
If (Utils.TransactionProperties.Contains("DELETE") AndAlso
Utils.TransactionProperties("DELETE").Equals(True)) Then
' This allows for a typesafe way to query for the existence of a property
End If
If (Utils.TransactionProperties.Contains("WORKFLOW") AndAlso
Utils.TransactionProperties("WORKFLOW").ToString.Contains("foo")) Then
' This allows you to search the contents of a string property
' You can then do an assignment
Dim strWFResponse As String =↵
Utils.TransactionProperties("WORKFLOW").ToString
End If
If (Utils.TransactionProperties.Contains("WORKFLOW") AndAlso
Utils.TransactionProperties("WORKFLOW").Equals("foobar")) Then
' This allows you to do a simple comparison
End If
778 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
804
|
Discussion
A transaction property is only good for as long as the current FIM transaction is running.
This makes it relevant only to the identity you are processing, and it is available across
all extensions that are touched as part of the synchronization of that identity; when the
next identity is loaded for processing, all transaction properties are destroyed.
See Also
Recipe 21.30; Recipe 21.31
21.33. Using a Single Rules Extension to Affect Multiple
Attribute Flows
Problem
You have several attributes that you would like to apply the same block of code to, and
you don’t want to duplicate the same block of code or call the same function from
multiple case statements.
Solution
1. Open Visual Studio and open your rules extension project solution.
2. Add a code block similar to this (before your main select case FlowRuleName
statement):
If FlowRuleName.StartsWith("Trim:") Then
' Trim String
'
' Reusable code to convert an attribute to its string format
' FlowRuleName will be passed as "Trim:srcAttribute,destAttribute"
'
Dim strAttributeName, strSrcAttribute, strDestAttribute, arrAttribs()
As String
' Replace the beginning of the flowrulename with nothing
strAttributeName = FlowRuleName.Replace("Trim:", "")
arrAttribs = strAttributeName.Split(","c) ' Splits the string
' on a comma
trSrcAttribute = arrAttribs(0) ' Assigns the first value
strDestAttribute = arrAttribs(1) ' Assigns the second value
' Now we can assign the value and trim any whitespace at the front and back
mventry(strDestAttribute).Value =↵
csentry(strSrcAttribute).Value.ToString.Trim
Else If FlowRuleName.StartsWith("MyFunction:") Then
21.33. Using a Single Rules Extension to Affect Multiple Attribute Flows | 779
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
805
|
' Apply custom function
'
' Reusable code to apply a custom function to an attribute
' FlowRuleName will be passed as
"MyFunction:sourceAttribute,destinationAttribute"
'
Dim strAttributeName, strSrcAttribute, strDestAttribute, arrAttribs()
As String
' Replace the beginning of the flowrulename with nothing
strAttributeName = FlowRuleName.Replace("MyFunction:", "")
arrAttribs = strAttributeName.Split(","c) ' Splits the string on a comma
strSrcAttribute = arrAttribs(0) ' Assigns the first value
strDestAttribute = arrAttribs(1) ' Assigns the second value
' Now we can apply your custom function prior to the assignment
Dim strSrcAttributeValue As String
strSrcAttributeValue = MySharedCodeLib.MyFunction↵
(csentry(strSrcAttribute).Value) mventry(strDestAttribute).Value =↵
strSrcAttributeValue
Else
' Continue on as you normally do
Select case FlowRuleName
3. Open the Synchronization Service Manager.
4. Apply the rule.
Discussion
Using this approach allows you to create several reusable code sections and apply them
to new advanced flows without the need for code changes or recompiles. This approach
is valid in both the import and export flow sections.
21.34. Flowing a Null Value to a Data Source
Problem
You need to delete or “flow a null” to an attribute in another data source.
Solution
1. Open the Synchronization Service Manager.
2. Click the Management Agents button on the toolbar.
3. In the Management Agents pane, double-click the AD MA.
780 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
806
|
4. In the Management Agent Designer pane on the lefthand side, select Configure
Attribute Flow.
5. Ensure that “user” is selected in the data source object type drop-down list.
6. Ensure that “person” is selected in the metaverse object type drop-down list.
7. In the Mapping Type section of the dialog, select Advanced.
8. In the Flow Direction section of the dialog, select Export and then check the box
to Allow Nulls.
If you don’t check the box to Allow Nulls, the rule value will never
be contributed.
9. Select telephoneNumber from the data source attributes list.
10. Select <object-id> from the Metaverse attributes list.
11. Selecting <object-id> here ensures that the source value will always be present;
otherwise, the rule will not fire if the source value in the metaverse is null.
12. Click New.
13. In the Advanced Export Attribute Flow Options dialog, type Delete:telephone
Number.
14. Open Visual Studio and open your rules extension project solution.
15. If you are using Recipe 21.33, insert the following before the final Else; otherwise,
only the final line is needed in a standard Case block:
Else If FlowRuleName.StartsWith("Delete") Then
'
' Reusable code to delete the referenced attribute
' FlowRuleName will be passed as "Delete:Attribute"
'
Dim strAttributeName As String
' Replace the beginning of the flowrulename with nothing
' to find the attribute to be deleted
strAttributeName = FlowRuleName.Replace("Delete:", "")
' This is whre we delete the value
csentry(strAttributeName).Delete()
Discussion
You never have to actually set a “null value” to contribute a delete to another data source.
This is partially due to the fact that different systems handle null values differently and
21.34. Flowing a Null Value to a Data Source | 781
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
807
|
in order to contribute the proper value, the Delete() property is used to handle that
translation for you.
To process any Advanced Rules extension, you need to have a value in the source at‐
tribute. A common problem occurs when the source attribute is null in the metaverse,
preventing the rule from firing on that identity. An advanced flow will fire if an existing
value is deleted (by contributing a null), but it will never fire if the value is null to begin
with. In addition, while using a fixed value like <object-id> ensures that the value will
never be null, this value will never change and therefore you will require a full syn‐
chronization run to trigger this rule; however, you can use Recipe 21.31 to force a full
synchronization on an individual identity and commit the changes.
See Also
Recipe 21.8; Recipe 21.31; Recipe 21.33
21.35. Importing and Decoding the accountExpires
Attribute
Problem
You want to import the accountExpires attribute into the metaverse as a stringformatted date/time value. This could be any of the Large Integer/Interval syntax at‐
tributes, such as accountExpires, badPasswordTime, lastLogoff, lastLogon, lastLo
gonTimestamp, lockoutTime, or pwdLastSet.
Solution
1. Open the Synchronization Service Manager.
2. See Recipe 21.29 to add a new metaverse attribute if necessary.
3. Click the Management Agents button on the toolbar.
4. In the Management Agents pane, double-click the AD MA.
5. In the Management Agent Designer pane on the lefthand side, select Configure
Attribute Flow.
6. Ensure that “user” is selected in the data source object type drop-down list.
7. Ensure that “person” is selected in the metaverse object type drop-down list.
8. In the Mapping Type section of the dialog, select Advanced.
9. In the Flow Direction section of the dialog, select Import.
10. Select accountExpires from the data source attributes list.
782 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
808
|
11. Select the attribute created in step 2 or an existing String attribute from the Met‐
averse attributes list (e.g., AccountExpirationDate).
12. Click New.
13. In the Advanced Import Attribute Flow Options dialog, type ConvertFileTime:ac
countExpires,AccountExpirationDate, and then click OK twice.
14. Open Visual Studio and open your rules extension project solution.
15. If you are using Recipe 21.33 insert the following before the final Else; otherwise,
only the final line is needed in a standard Case block:
ElseIf FlowRuleName.StartsWith("ConvertFileTime:") Then
'
' Reusable code to convert generalized time into string format
' FlowRuleName will be passed as
"ConvertFileTime:sourceAttribute,destinationAttribute"
'
Dim strAttributeName, strSourceAttribute, strDestinationAttribute,↵
arrAttribs()
As String
' Replace the beginning of the flowrulename with nothing to find↵
the attribute to be deleted
strAttributeName = FlowRuleName.Replace("ConvertFileTime:", "")
arrAttribs = strAttributeName.Split(","c)
strSourceAttribute = arrAttribs(0)
strDestinationAttribute = arrAttribs(1)
' NOTE: The value will be invalid if it was never set
' (9223372036854775807 (0x7FFFFFFFFFFFFFFF))
' or 0 if it was set and then later cleared
Const AD_ACCOUNT_NO_EXPIRATION As Long = 9223372036854775807
If (strSourceAttribute = "accountExpires") Then
If (csentry(strSourceAttribute).Value = 0 OrElse
csentry(strSourceAttribute).Value = AD_ACCOUNT_NO_EXPIRATION) Then
' The value was cleared or never set
mventry(strDestinationAttribute).Value = "Never"
Else
' The value has been set
Dim dtFileTime As DateTime =
DateTime.FromFileTime(DateTime.Parse(csentry↵
(strSourceAttribute).Value).ToFileTme)
mventry(strDestinationAttribute).Value = Format(dtFileTime, "yyyy-MM-dd")
End If
Else
' We are not dealing with the accountExpires attribute, just decode it
Dim dtFileTime As DateTime =
DateTime.FromFileTime(DateTime.Parse(csentry(strSourceAttribute).Value)↵
21.35. Importing and Decoding the accountExpires Attribute | 783
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
809
|
.ToFileTime)
mventry(strDestinationAttribute).Value = Format(dtFileTime, "yyyy-MM-dd")
End If
Discussion
The Large Integer/Interval syntax in Active Directory can be decoded by using the
DateTime.FromFileTime() function in the .NET Framework. By using the Date
Time.Parse().ToFileTime property, you are ensuring that the value you are getting is
a valid date/time.
If you are concerned with data integrity here, consider wrapping this
in a Try/Catch block.
See Also
Recipe 21.29; Recipe 21.33
21.36. Exporting and Encoding the accountExpires
Attribute
Problem
You want to export to the accountExpires attribute from a string-formatted date/time
value in the metaverse. This could be any of the Large Integer/Interval syntax attributes,
such as accountExpires, badPasswordTime, lastLogoff, lastLogon, lastLogonTimes
tamp, lockoutTime, or pwdLastSet.
Solution
1. Open the Synchronization Service Manager.
2. Click the Management Agents button on the toolbar.
3. In the Management Agents pane, double-click the AD MA.
4. In the Management Agent Designer pane on the lefthand side, select Configure
Attribute Flow.
5. Ensure that “user” is selected in the data source object type drop-down list.
6. Ensure that “person” is selected in the metaverse object type drop-down list.
784 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
810
|
7. In the Mapping Type section of the dialog, select Advanced.
8. In the Flow Direction section of the dialog, select Export.
9. Select accountExpires from the data source attributes list.
10. Select an existing String attribute from the Metaverse attributes list (e.g.,
AccountExpirationDate).
11. Click New.
12. In the Advanced Export Attribute Flow Options dialog, type ConvertFileTime:ac
countExpires,AccountExpirationDate, and then click OK twice.
13. Open Visual Studio and open your rules extension project solution.
14. If you are using Recipe 21.33, insert the following before the final Else; otherwise,
only the final line is needed in a standard Case block:
ElseIf FlowRuleName.StartsWith("ConvertFileTime:") Then
'
' Reusable code to convert generalized time into string format
' FlowRuleName will be passed as
"ConvertFileTime:sourceAttribute,destinationAttribute"
'
Dim strAttributeName, strSourceAttribute, strDestinationAttribute,↵
arrAttribs()
As String
' Replace the beginning of the flowrulename with nothing to find↵
the attribute to be deleted
strAttributeName = FlowRuleName.Replace("ConvertFileTime:", "")
arrAttribs = strAttributeName.Split(","c)
strSourceAttribute = arrAttribs(0)
strDestinationAttribute = arrAttribs(1)
' NOTE: The value will be invalid if it was never set
' (9223372036854775807 (0x7FFFFFFFFFFFFFFF))
' or 0 if it was set and then later cleared
Const AD_ACCOUNT_NO_EXPIRATION As Long = 9223372036854775807
If (strDestinationAttribute = "accountExpires") Then
If (mventry(strSourceAttribute).IsPresent = False) Then
' The value in the metaverse is empty so remove the account
expiration
csentry(strDestinationAttribute).IntegerValue = 0
Else
' We should have a date value present to enforce
Dim dtFileTime As DateTime =
DateTime.Parse(mventry(strSourceAttribute).Value)
csentry(strDestinationAttribute).IntegerValue =
dtFileTime.ToFileTimeUtc()
End If
21.36. Exporting and Encoding the accountExpires Attribute | 785
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
811
|
Else
' We are not dealing with the accountExpires attribute,↵
just encode it
Dim dtFileTime As DateTime =
DateTime.Parse(mventry(strSourceAttribute).Value)
csentry(strDestinationAttribute).IntegerValue =↵
dtFileTime.ToFileTimeUtc()
End If
Discussion
The Large Integer/Interval syntax in Active Directory can be encoded by using the
DateTime.ToFileTime() function in the .NET Framework. By using the Date
Time.Parse() property, you are ensuring that the value you are getting is a valid date/
time.
If you are concerned with data integrity here, consider wrapping this
in a Try/Catch block.
See Also
Recipe 21.29; Recipe 21.33; Recipe 21.35
786 | Chapter 21: Microsoft Forefront Identity Manager
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
812
|
We’d like to hear your suggestions for improving our indexes. Send email to index@oreilly.com.
Index
Symbols
. (period), using for hostname in AdMod or Ad‐
Find, 639
15 Field Engineering diagnostics logging set‐
tings, 549
32- or 64-bit computers, 86
/3GB switch, enabling to increase LSASS cache,
86
5807 events, 403
88 classes, finding, 375
A
abstract classes, finding, 375
Access Control Entries (ACEs), 252
access control, dynamic (see Dynamic Access
Control)
Account Lockout and Management toolset, 212
accountExpires attribute, user objects, 237
exporting and encoding, 784
importing and exporting in FIM, 782
ACEs (Access Control Entries), 252
ACL Editor, 513
changing ACL of an object, 518
configuring permission inheritance, 516
customizing, 514
familiarizing yourself with, 514
resetting object’s ACL to default defined in
schema, 521
viewing effective permissions on an object,
515
acldiag utility
comparing ACL of object to default defined
in schema, 520
viewing effective permissions on an object,
516
ACLs (access control lists), 47, 501
AD LDS permissions, 652
changing default for object class in schema,
519
changing for an object, 518
comparing ACL of object to default in sche‐
ma, 520
computer objects, 277
DACL and SACL, 252
GPO, security filtering and, 328
List Object Access mode and, 524
modifying ACL on administrator accounts,
525
resetting object’s ACL to default defined in
schema, 521
setting when delegating control of an OU,
183
viewing ACL for an object, 513
Active Directory
creating AD management agent in FIM, 724
Exchange Server and, 674
787
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
813
|
exporting objects from AD MA to Active Di‐
rectory, 750
multiple versions on corporate networks, 3
preparing for Exchange, 676
setting up advanced export attribute flow
from FIM, 736
simple export attribute flow from FIM, 729
Active Directory Administrative Center
ACL Editor, customizing, 514
applying FGPP to group object, 270
applying fine-grained password policy to
user object, 216
authoritative restore of object or subtree, 586
changing user’s primary group, 223
configuring central access rule for Dynamic
Access Control, 533
copying user’s group membership to another
user, 225
creating a computer, 274
creating a fine-grained password policy
(FGPP), 342
creating a user, 192
creating an OU, 166
creating central access policy for Dynamic
Access Control, 534
creating claim type, 531
creating computer for specific user or group,
276
creating groups, 249
creating resource property for Dynamic Ac‐
cess Control, 532
Deleted Objects container, 577
deleting a computer, 278
deleting a user, 201
finding domain controllers or global catalog
servers in a site, 91
finding orphaned objects, 454
modifying an object, 134
modifying computer object’s attributes, 292
modifying default display name when creat‐
ing users, 191
modifying group attributes, 260
moving a group within a domain, 256
moving object to different OU or container,
145
preventing user from changing a password,
228
preventing user’s password from expiring,
230
removing all group memberships from user,
222
requiring user to change password at next
logon, 229
restoring a deleted group, 268
restoring deleted domain controller in Win‐
dows Server 2012, 80
restoring deleted user, 244
searching for deleted objects, 602
setting user’s account options, 233
setting user’s account to expire, 236
setting user’s password, 227
undeleting a single object, 603
viewing direct members of a group, 252
Active Directory Application Mode (ADAM),
625
Active Directory Certificate Services (AD CS),
17, 502
Active Directory Domain Services (AD DS), 16,
17
removing AD DS role, 19
stopping and restarting, 576
Active Directory Domains and Trusts MMC
snap-in
configuring alternate UPN suffix, 667
creating an external trust, 35
creating shortcut trust between AD do‐
mains, 39
creating trust to a Kerberos realm, 40
creating UPN suffix for a forest, 243
finding Domain Naming FSMO role, 95
managing Selective Authentication for
trusts, 49
raising domain function level to Windows
Server 2012, 27
raising functional level of Windows Server
2008 or 2008 R2 forest, 28
resetting a trust, 45
transferring Domain Naming FSMO role, 98
verifying a trust, 44
viewing trusts for a domain, 42
Active Directory Federation Services, 17, 657–
672
configuring a claims provider trust, 665
configuring AD FS 2.x and AD FS 1.x intero‐
perability, 668–671
configuring alternate UPN suffix, 666
configuring LDAP attribute store, 661
configuring logging for, 671
788 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
814
|
configuring Microsoft SQL Server attribute
store, 662
creating a replying party trust, 664
creating claim descriptions, 663
installing AD FS Federation Service, 660
installing prerequisites, 658
Active Directory Federation Services MMC
snap-in (see AD FS MMC snap-in)
Active Directory Lightweight Directory Service,
17, 625–656
AD Schema Analyzer, 353
changing password for a user, 640
changing ports used by an instance, 633
configuring intra-site replication, 648
creating groups, 643
creating new instance of, 627
creating new replica of configuration set, 629
enabling and disabling a user, 641
enabling auditing of access, 654
extending AD LDS Schema, 634
forcing replication, 649
importing data into an instance, 647
installing, 626
listing instances installed on a computer, 633
managing AD LDS application partitions,
636
managing group memberships, 644
managing organizational units, 637
managing permissions, 652
managing replication authentication, 650
managing users, 639
starting and stopping an instance, 631
viewing and modifying object attributes, 645
Active Directory Lightweight Directory Services
Setup Wizard
creating new AD LDS instance, 627
creating new replica of AD LDS configura‐
tion set, 629
Active Directory Migration Tool (ADMT)
MMC snap-in
moving a group to another domain, 257
moving computer to new domain, 281
moving object between different domains,
147
Active Directory Recycle Bin feature, 80, 576
Active Directory Rights Management Services,
17
Active Directory Schema Analyzer, 353
Active Directory Schema MMC snap-in
adding new attribute to the schema, 354
adding new class to the schema, 360
changing default ACL for object class in
schema, 519
deactivating classes and attributes, 382
finding FSMO role holders, 95
finding mandatory and optional attributes of
a class, 377
finding structural, auxiliary, abstract, and 88
classes, 375
indexing an attribute, 363
managing Schema Master FSMO, 386
modifying attributes copied during duplica‐
tion of a user, 365
modifying attributes included in ANR, 367
modifying default security of a class, 378
registering, 349
reloading the schema cache, 384
transferring FSMO roles, 98
viewing a class, 362
viewing an attribute, 358
Active Directory Services Interface (ADSI), fast
binds, 116
Active Directory Sites and Services MMC snapin
changing inter-site replication interval, 446
configuring intra-site replication for AD
LDS, 649
configuring universal group caching for a
site, 399
creating a connection object, 428
creating a site, 393
creating a site link, 407
creating a site link bridge, 417
creating a subnet, 401
delegating control of a site, 398
Delegation of Control Wizard, 507
deleting a site, 397
deleting a subnet, 405
disabling inter-site compression of replica‐
tion traffic, 448
disabling KCC for a site, 434
disabling site link transitivity or site link
schedules, 415
enabling and disabling global catalog (GC),
87
enabling change notification for a site link,
412
Index | 789
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
815
|
enabling universal group membership cach‐
ing, 266
finding ISTG for a site, 430
forcing AD LDS replication, 650
forcing replication from one domain con‐
troller to another, 442
listing connection objects for a server, 429
listing replication partners for domain con‐
troller, 455
listing servers in a site, 421
listing sites in a domain, 395
listing subnets, 402
modifying cost for a site link, 411
modifying replication schedules, 413
modifying sites associated with a site link,
410
moving domain controller to a different site,
77, 422
protecting an OU against accidental dele‐
tion, 187
renaming a site, 396
setting preferred bridgehead server for a site,
419
transferring ISTG to another site, 431
triggering the KCC, 432
Active Directory Users and Computers MMC
snap-in, 52
ACL Editor, customizing, 514
adding and removing group members, 254
adding or removing computer account from
a group, 285
assigning or removing manager for an OU,
183
changing scope or type of a group, 259
copying a user, 208
creating inetOrgPerson user, 196
delegating control for managing group
membership, 263
delegating control of an OU, 182
Delegation of Control Wizard, 507
deleting an object, 154
deleting an OU, 174
deleting objects in an OU, 172
determining user’s last logon time, 237
enabling and disabling users, 218
enumerating objects in an OU, 171
enumerating OUs in a domain, 168
exporting objects to CSV file, 161
finding an OU, 169
finding computers with particular OS, 294
finding disabled users, 219
finding domain controllers for a domain, 74
finding holders of PDC Emulator, RID Mas‐
ter, and Infrastructure Master roles, 96
finding users who haven’t logged on recently,
239
identifying a computer’s role, 301
listing all computer accounts in a domain,
300
loading telephoneNumber changes from AD
into FIM, 765
modifying an OU, 180
modifying attribute for several users at once,
200
modifying default display name when creat‐
ing users, 191
modifying Password Replication Policy
(PRP) on RODC, 63
moving computer within same domain, 280
moving objects to different OU, 175
moving users, 203
protecting computer against accidental dele‐
tion, 302
protecting group against accidental deletion,
269
protecting OU against accidental deletion,
186
protecting user against accidental deletion,
245
renaming an OU, 178
renaming users, 206
resetting a computer account, 287
resolving primary group ID for a user, 264
restricting DHCP administrators, 498
revoking delegated permissions, 512
setting user’s profile attributes, 202
unlocking a user, 210
viewing and modifying user’s permitted log‐
on hours, 240
viewing effective PSO for a user, 345
viewing fine-grained password policy for
user account, 217
viewing nested members of a group, 253
viewing permissions of a group, 251
viewing RODCs that cached computer’s
password, 303
viewing user’s group membership, 221
790 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
816
|
AD CS (see Active Directory Certificate Serv‐
ices)
AD Directory Information Tree (DIT) (see DIT;
ntds.dit file)
AD DS (see Active Directory Domain Services)
AD FS MMC snap-in
configuring AD FS 2.x and AD F 1.x intero‐
perability, 668
configuring LDAP attribute store, 662
configuring Microsoft SQL Server attribute
store, 662
creating a replying party trust, 664
creating claim descriptions, 663
AD integrated zones, 462
converting standard primary zone to, 468
delegating control of, 474
moving into application partition, 469
AD LDS (see Active Directory Lightweight Di‐
rectory Service)
ADAC (see Active Directory Administrative
Center)
ADAM (Active Directory Application Mode),
625
adaminstall utility, 631
Add Attribute To Object Type dialog box, 773
Add Monitored Server Wizard, 418
Add-ADFSRelyingPartyTrust cmdlet, 665
Add-DnsServerConditionalForwarderZone
cmdlet, 474
Add-DnsServerPrimaryZone cmdlet, 464
address list, creating, 700
AdFind utility
attribute-scoped queries with -asq switch,
127
configuring universal group caching for a
site, 400
connecting to object GUID, 117
counting objects in Active Directory, 111
deleting objects in an OU, 173
determining number of child objects for an
OU, 181
determining user’s last logon, 237
disabling KCC for a site, 435
displaying efficiency statistics for queries,
552
displaying RootDSE object, 105
enabling change notification for site link,
413
enumerating and connecting to well-known
GUIDs, 118
enumerating objects in an OU, 171
enumerating OUs in a domain, 168
exporting objects to CSV file, 161
switches to customize CSV file output,
162
finding all group memberships for user, 225
finding an OU, 169
finding application partitions hosted by a
DC, 616
finding application partitions in a forest, 610
finding attributes included in ANR, 369
finding attributes included in PAS, 371
finding attributes not copied during user du‐
plication, 366
finding classes, 376
finding computers with particular OS, 295
finding conflict objects, 452
finding disabled users, 220
finding GPOs in a domain, 308
finding indexed attributes, 364
finding ISTG for a site, 430
finding linked attributes, 374
finding mandatory and optional attributes of
a class, 377
finding nonreplicated and constructed at‐
tributes, 372
finding orphaned objects, 454
finding Schema FSMO role owner, 386
finding site links for a site, 409
LDAP controls, 113
listing replication partners for domain con‐
troller, 455
listing servers in site topology, 421
listing sites in a forest, 395
listing subnets and displaying their proper‐
ties, 402
moving objects between OUs, 175
removing all group memberships from user,
223
searching for deleted objects, 602
searching for objects in a domain, 120
searching the global catalog, 123
searching with bitwise filter, 129
undeleting a container object, 605
using with AdMod to modify AD Users and
Computers, 53
using with AdMod to remove a trust, 46
Index | 791
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
817
|
viewing AD LDS object attributes, 646
viewing an attribute, 358
viewing class properties, 362
viewing created and last-modified time‐
stamps of an object, 156
viewing direct members of a group, 252
viewing object metadata, 456
viewing object’s attributes, 107, 110
viewing permissions of a group, 251
viewing RODCs that cached computer’s
password, 304
viewing site properties, 395
working with AD LDS, creating environ‐
ment variables for often-used switches,
638
ADFS (see Active Directory Federation Serv‐
ices)
Admin Role Separation feature, 62
Admin SD Holder process, 525
permissions and, 518
administration, 182
(see also Active Directory Administrative
Center)
assigning or removing manager for an OU,
183
creating administrative alert for perfor‐
mance, 559
delegating control for managing group
membership, 263
delegating control of a site, 398
delegating control of AD integrated zone,
474
delegating control of an OU, 182
delegating control of managing application
partition, 621
delegating for GPOs, 329
delegating rights to authorize DHCP server,
496
Delegation of Control Wizard, 507
customizing, 509–511
emailing administrator on performance
alert, 560
Exchange Server 2013, 674
modifying ACL on administrator accounts,
525
resetting DSRM administrator password,
584
restricting DHCP administrators, 497
revoking delegated permissions, 512
Administrative templates (.adm files), 306
Administrator account, viewing attributes of,
107
.adml files, creating custom settings for GPO,
319
AdMod utility, 53
(see also AdFind utility)
adding and removing group members, 255
adding attribute to RO-FAS, 381
adding new class, 360
adding or removing computer from a group,
285
adding schema attribute, 355
allowing computers to use different domain
suffix, 494
assigning or removing manager for an OU,
184
changing inter-site replication interval, 447
changing intra-site replication notification
interval, 445
changing machine account quota, 291
changing password for AD LDS user, 641
changing scope or type of a group, 259
changing subnet’s site assignment, 406
changing tombstone weight in quota calcu‐
lations, 569
configuring alternate UPN suffix, 667
configuring universal group caching for a
site, 400
converting user object to inetOrgPerson ob‐
ject, 199
copying user’s group membership to another
user, 225
creating a computer, 275
creating a site, 394
creating a site link, 408
creating a site link bridge, 417
creating a subnet, 401
creating a user account, 193
creating an object, 132
creating an OU, 166
creating groups, 249
numeric values for group types, 249
creating inetOrgPerson user, 197
creating large number of users, 195
creating or deleting AD LDS OUs, 638
creating UPN suffix for a forest, 243
deactivating classes, 382
deleting a computer, 278
792 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
818
|
deleting a site, 397
deleting a subnet, 406
deleting a user, 201
deleting an object, 154
deleting an OU, 174
deleting container with child objects, 155
disabling inter-site compression of replica‐
tion traffic, 448
disabling KCC for a site, 435
dynamically linking auxiliary class to exist‐
ing object instance, 139
enabling and disabling global catalog (GC),
87
enabling group caching, 267
LDAP controls, 113
managing AD LDS replication authentica‐
tion, 651
managing AD LDS users, 639
managing confidentiality bit for schema at‐
tributes, 379
modifying AD LDS object attributes, 646
modifying an object, 134
modifying an OU, 180
modifying attributes copied during user du‐
plication, 365
modifying attributes included with ANR,
367
modifying computer object’s attributes, 293
modifying cost for a site link, 412
modifying default display name when creat‐
ing users, 191
modifying default security of a class, 378
modifying group attributes, 261
modifying replication schedules, 414
modifying set of attributes stored on global
catalog, 370
modifying tombstone lifetime for a domain,
606
moving a computer within same domain,
281
moving a group within a domain, 256
moving an OU, 178
moving domain controller to different site,
77, 422
moving object to different OU or container,
146
moving users, 204
performing online defrag, 593
refreshing a dynamic object, 143
reloading the schema cache, 384
removing all group memberships from user,
223
renaming a site, 396
renaming an object, 151
renaming an OU, 179
renaming users, 207
requiring user to change password at next
logon, 229
restricting DHCP administrators, 498
searchFlags value for classSchema object, en‐
abling, 363
setting preferred bridgehead server for a site,
420
setting reference domain for application par‐
tition, 621
setting replication notification delay for ap‐
plication partition, 619
setting user’s password, 227
setting user’s profile attributes, 202
transferring ISTG to another site, 431
using with AdFind to move objects to differ‐
ent OU, 175
using with AdFind to remove a trust, 46
working with AD LDS, creating environ‐
ment variables for often-used switches,
638
ADMT (see Active Directory Migration Tool
MMC snap-in)
.admx files, 306
creating custom settings for GPO, 318
AdPrep utility
preparing domain for Windows upgrade,
352
preparing domain or forest for Windows
Server 2012, 30
determining if AdPrep has completed, 31
preparing forest for Windows upgrade, 352
adrestore utility, 602, 604
ADSI (Active Directory Services Interface), fast
binds, 116
ADSI Edit
adding fields to AD Users and Computers,
52
adding or removing replica server for appli‐
cation partition, 611
changing garbage collection interval, 598
changing intra-site replication notification
interval, 445
Index | 793
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
819
|
changing maximum number of computers
user can join to domain, 291
changing password for AD LDS user, 640
changing weight of tombstone objects in
quota calculations, 568
computers using different domain suffix
from AD domain, 493
converting between user and inetOrgPerson
objects, 198
creating an object, 132
creating or deleting AD LDS groups, 643
delegating control of managing application
partition, 621
delegating rights to authorize DHCP server,
496
deleting an object, 153
deleting container with child objects, 155
determining if AdPrep has completed, 32
dynamically linking auxiliary class to exist‐
ing object instance, 139
enabling and disabling AD LDS user, 642
enabling anonymous LDAP access, 505
enabling List Object Access mode, 523
finding replica servers for application parti‐
tion, 614
managing AD LDS group memberships, 644
managing AD LDS replication authentica‐
tion, 651
managing AD LDS users, 639
modifying default display name when creat‐
ing users, 191
modifying default LDAP query policy, 157
modifying default TTL settings for dynamic
objects, 144
modifying tombstone lifetime for a domain,
605
referencing an external domain, 149
removing AD LDS application partition, 636
renaming an object, 151
setting default quota for all security princi‐
pals, 570
setting reference domain for application par‐
tition, 620
setting replication notification delay for ap‐
plication partition, 618
viewing and modifying AD LDS object at‐
tributes, 646
viewing RODCs that cached user’s password,
232
viewing user’s managed objects, 242
ADS_GROUP_TYPE_SECURITY_ENABLED
flag, 260
ADS_USER_FLAG_ENUM enumeration, 235
ADUC MMC snap-in (see Active Directory
Users and Computers MMC snap-in)
Advanced Export Attribute Flow Options dialog
box, 785
Advanced Import Attribute Flow Options dia‐
log box, 783
Ambiguous Name Resolution (ANR), 130
default attributes included with, 368
efficiency statistics on search, 553
modifying attributes included with, 367
anonymous LDAP access, 505
ANR (see Ambiguous Name Resolution)
anti-malware scanning for Exchange Server, en‐
abling or disabling, 704
application partitions, 14, 607–623
adding or removing replica server for, 611
anatomy of, 608
creating and deleting, 608
defined, 469
delegating control of management, 621
finding in a forest, 609
finding replica servers for, 613
hosted by a server, finding, 615
managing for AD LDS, 636
moving AD integrated zones into, 469
setting reference domain for, 620
setting replication notification delay for, 618
verifying instant correction on a server, 616
Assessment and Planning Solution Accelerator,
35
attribute flow rules, 718
defining advanced import attribute flow, 731
implementing advanced attribute flow rules
extension, 733–736
setting up advanced export attribute flow in
Active Directory, 736
setting up simple export attribute flow to Ac‐
tive Directory, 729
setting up simple import attribute flow, 727
using single rules extension to affect multi‐
ple attribute flows, 779
attribute stores
configuring LDAP attribute store for AD FS,
661
794 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
820
|
configuring Microsoft SQL Server attribute
store for AD FS, 662
extracting attribute store information as AD
FS 1.x claim types, 669
attribute value assertions (AVAs), 145
attribute-scoped query, searching with, 126
attributes
adding new attribute to the schema, 354–357
adding to object type in FIM, 773
adding to Read-Only Filtered Attribute Set
(RO-FAS), 381
copied during duplication of user, modify‐
ing, 365
data stored by attributes set on an object,
457
deactivating, 382
finding linked attributes, 373
finding mandatory and optional attributes of
a class, 377
finding nonreplicated and constructed at‐
tributes, 371
indexing, 363
managing confidentiality bit, 379
modifying attributes included in ANR, 367–
369
modifying set of attributes stored on global
catalog, 369
of site objects, 390
OID for new attribute, 350
redefining, 383
viewing properties of, 358
attributeSchema objects, 14, 348
adding to Schema container, 356
attributes of, 349
lDAPDisplayName attribute, 359
linkID attribute, 375
searchFlags and systemFlags attributes, 130
searchFlags attribute, 364
systemFlags bit values, 359
attributeSyntax attribute, 356
auditing
enabling for AD LDS access, 654
enabling for directory access, 561–564
enabling for Registry keys, 564
authentication, 502
authorization versus, 657
enabling claims for devices in a domain, 536
enabling domain controller support for
claims and compound authentication,
535
enabling Kerberos logging, 545
enabling strong domain authentication, 521
forcing Kerberos to use TCP, 527
managing AD LDS replication authentica‐
tion, 650
modifying Kerberos settings, 529
Selective Authentication for trusts, 49
viewing access tokens, 530
viewing and purging Kerberos tickets, 526
authoritative restore
complete, performing, 588
performing for object or subtree, 586
requiring full reboot into DSRM, 576
restoring a deleted object, 244
authorization, 657
auxiliary classes
dynamically linking to existing object in‐
stances, 139
finding, 375
AVAs (attribute value assertions), 145
B
backlink, 375
backup, 576
backing up the AD database, 578
creating reserve file on disk containing
ntds.dit file, 595
snapshots of AD database, 578, 579–581
tombstone objects and, 577
Backup-GPO cmdlet, 336
backupgpo.wsf script, 335
bcdedit utility, 86
restarting domain controller in DSRM, 583
bit flag attribute, modifying, 136–138
sample bit flag attribute values, 137
bitwise filters, searching with, 128
books and magazines on Active Directory, 9
bridgehead servers
finding for a site, 418
setting preferred server for a site, 419
C
CalcBit function, 138
CD (connected directory) in FIM, 710
Index | 795
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
821
|
central access policy
applying, 535
creating, 534
central access rule, 533
Certificate Lifecycle Manager (CLM), 707
certificate requests, generating in IIS installa‐
tion, 658
certificates, installing, 660
certreq utility, 660
change notification, enabling for a site link, 412
child domains, 20
circular logging, 575
claims, 657
configuring a claims provider trust, 665
configuring AD FS 2.x and AD FS 1.x intero‐
perability, 668–671
creating a claim type, 531
creating claim descriptions, 663
enabling domain controller support for, 535
enabling for devices in a domain, 536
classes
AD, claim types associated with, 531
adding new class to schema, 360
changing default ACL for object class in
schema, 519
deactivating, 382
default ACL for object class in schema, com‐
paring to ACL of an object, 520
dynamically linking auxiliary class to exist‐
ing object instance, 139
finding mandatory and optional attributes
of, 377
finding structural, auxiliary, abstract, and 88
classes, 375
modifying default security, 378
OID for new class, 350
redefining, 383
supported class types in AD schema, 376
viewing attributes of, 362
classSchema objects, 14
attributes of, 347
creating, important attributes, 361
objectClassCategory attribute, 376
CLI (command-line interface), 2
AD FS
configuring alternate UPN suffix, 667
generating a certificate request, 659
AD LDS
changing password for user, 641
creating new instance, 628
creating new replica of configuration set,
630
enabling auditing of access, 655
enabling or disabling a user, 642
extending the schema, 635
forcing replication, 650
importing data into an instance, 647
listing instances installed on a computer,
633
managing application partitions, 636
managing group memberships, 644
managing OUs, 638
managing permissions, 653
managing replication authentication, 651
managing users, 639
starting and stopping an instance, 632
viewing and modifying object attributes,
646
adding fields to AD Users and Computers,
53
application partitions
adding or removing replica server for,
612
creating and deleting, 609
delegating control of managing, 622
finding in a forest, 610
finding replica servers for, 614
hosted by a server, finding, 615
setting reference domain for, 620
setting replication notification delay, 619
verifying correct instantiation on server,
617
backup and recovery
authoritative restore of object or subtree,
586
backing up the AD database, 578
creating AD snapshot, 579
creating reserve DIT file, 595
mounting AD snapshot, 580
nonauthoritative restore of domain con‐
troller, 585
performing AD database recovery, 594
resetting DSRM administrator password,
584
restarting domain controller in DSRM,
583
computer objects
adding or removing from a group, 285
796 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
822
|
binding to default container, 297
changing default container for, 299
changing machine account quota, 291
creating, 275
creating computer for specific user or
group, 276
deleting, 278
finding computers with particular OS,
294
finding inactive or unused computers,
289
identifying computer role, 301
joining to a domain, 279
listing all computer accounts in a do‐
main, 300
modifying attributes, 293
moving to different domain, 282
moving within same domain, 281
protecting against accidental deletion,
303
renaming, 284
resetting computer account, 288
testing secure channel for, 286
viewing RODCs that cached password,
304
deleted objects, searching for, 602
DHCP
authorizing a DHCP server, 495
restricting administrators, 498
DIT maintenance
checking integrity of DIT file, 589
determining amount of whitespace in
DIT, 596
determining size of DIT file, 601
moving DIT files, 590
offline defrag of DIT to reclaim space,
597
performing online defrag manually, 593
repairing or recovering the DIT, 591
DNS
clearing DNS server cache, 483
computers using different domain suffix
from AD domain, 494
configuring conditional forwarding, 473
configuring forwarding, 472
configuring zone transfers, 470
converting zone to AD integrated zone,
468
creating and deleting resource records,
476
creating forward lookup zone, 463
creating reverse lookup zone, 465
delegating control of AD integrated zone,
475
deregistering DC’s resource records, 488
enabling DNS server debug logging, 486
modifying DNS server configuration, 480
moving AD integrated zones into appli‐
cation partition, 469
preventing DC from dynamically regis‐
tering resource records, 489, 491
querying resource records, 478
registering DC’s resource records, 488
scavenging old resource records, 481
verifying DC can register its resource re‐
cords, 484
viewing server’s zones, 466
domain controllers
configuring to use external time source,
84
finding closest, 75
finding DC or GC servers in a site, 91
finding DCs and GCs via DNS, 92
finding for a domain, 74
finding number of logon attempts for, 85
finding services advertised by, 79
finding site for, 76
increasing LSASS cache, 86
modifying password caching policy on all
RODCs, 64
modifying Password Replication Policy
on RODC, 63
moving to different site, 77
removing, 71
renaming, 73
resetting TCP/IP stack, 82, 82
restoring deleted DC in Windows Server
2012, 81
verifying promotion of, 70
domains
finding duplicate SIDs, 51
finding NetBIOS name of, 25
removing orphaned domain, 22
Exchange Server 2013
creating unattended installation files for,
683
installing first server, 680
Index | 797
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
823
|
installing management tools, 684
preparing Active Directory for Exchange,
677
stopping and starting, 685
finding disabled users, 220
finding duplicate SIDs in a domain, 51
finding locked-out users, 209
finding users with passwords nearing expira‐
tion, 231
forests
creating UPN suffix for, 243
FSMO roles
finding holders of FSMO roles, 96
finding PDC Emulator role owner via
DNS, 100
seizing, 99
transferring a role, 98
transferring to different DC, 98
garbage collection interval, changing, 599
global catalog
checking if DC promotion is complete,
89
enabling and disabling, 87
enumerating GC servers in a forest, 90
Group Policy Management Console sample
scripts, 307
Group Policy Objects (GPOs)
applying security filter to, 328
backing up, 335
copying, 310
creating, 309
creating migration table for, 317
deleting, 311
editing fine-grained password policy, 344
finding GPOs in a domain, 308
importing settings into, 315
listing links for, 324
refreshing settings on a computer, 340
restoring, 337
restoring default GPO, 341
reviewing settings, 313
viewing effective PSO for a user, 345
viewing RSoP, 339
groups
adding and removing members, 255
applying fine-grained password policy to,
271
changing scope or type of, 259
creating, 249
delegating control for managing mem‐
bership, 263
enabling universal group membership
caching, 266
modifying attributes, 261
moving to another domain, 258
moving within a domain, 256
protecting against accidental deletion,
270
viewing direct members of, 252
viewing nested members of, 254
viewing permissions of, 251
help information for tools, 7
LDIF and ldifde utility, 4
logging
enabling diagnostics logging, 541
enabling GPO client logging, 543
enabling Kerberos logging, 545
enabling NetLogon logging, 542
logging number of expired tombstone ob‐
jects, 600
monitoring
using STATS control to view LDAP query
statistics, 552
viewing DNS server performance statis‐
tics, 546
Windows Time Service, 548
objects
connecting to object GUID, 117
counting in Active Directory, 111
creating an object, 132
creating dynamic object, 141
deleting an object, 154
deleting container with child objects, 155
displaying RootDSE object, 105
dynamically linking auxiliary class to ex‐
isting object instance, 139
exporting to CSV file, 161
importing using LDIF file, 160
modifying an object, 134
modifying default LDAP query policy,
157
modifying default TTL settings for dy‐
namic objects, 144
moving to different OU or container, 146
refreshing a dynamic object, 143
renaming an object, 151
searching for large number of, 125
searching for, in a domain, 120
798 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
824
|
searching the global catalog, 123
searching with attribute-scoped query,
127
searching with bitwise filter, 129
using LDAP controls, 113
viewing attributes, 107
viewing created and last-modified time‐
stamps, 156
organizational units
assigning or removing manager, 184
creating an OU, 166
deleting an OU, 174
deleting objects in an OU, 173
determining number of child objects, 181
enumerating objects in an OU, 171
enumerating OUs in a domain, 168
finding an OU, 169
modifying an OU, 180
moving an OU, 177
moving objects between OUs, 175
protecting against accidental deletion,
186
renaming an OU, 179
quotas
assigned to security principal, finding,
567
changing tombstone weight in quotas,
568
creating, 565
finding usage for security principals, 571
setting default for security principals, 570
replaceable text in examples, 6
replication
changing inter-site replication interval,
447
changing intra-site replication notifica‐
tion interval, 445
checking for potential problems, 449
determining if domain controllers are in
sync, 439
disabling inter-site compression of traf‐
fic, 448
enabling and disabling on DCs, 444
enabling strict or loose consistency, 451
finding conflict objects from collisions,
452
finding orphaned objects, 454
forcing from one DC to another, 442
listing replication partners for a DC, 455
viewing object metadata, 456
viewing status for domain controllers,
440
viewing unreplicated changes between
DCs, 442
running tools with alternate credentials, 3
schema
adding attribute to Read-Only Filtered
Attribute Set (RO-FAS), 381
adding new attribute, 355
adding new class, 360
copying attributes when duplicating a
user, 365
deactivating classes and attributes, 382
finding classes, 375
finding linked attributes, 374
finding mandatory and optional at‐
tributes of a class, 377
finding nonreplicated and constructed
attributes, 372
indexing an attribute, 363
managing confidentiality bit, 379
managing Schema Master FSMO, 386
modifying attributes included in ANR,
367
modifying attributes stored on global cat‐
alog, 369
modifying default security of a class, 378
reloading the cache, 384
viewing a class, 362
viewing an attribute, 358
security and authentication
changing ACL of an object, 518
comparing ACL of object to default de‐
fined in schema, 520
configuring permission inheritance, 517
delegation of control over objects, 508
forcing Kerberos to use TCP, 528
LDAP signing and encryption, tools sup‐
porting, 504
resetting object’s ACL to default in sche‐
ma, 521
revoking delegated permissions, 512
viewing access tokens, 530
viewing ACL for an object, 513
viewing and purging Kerberos tickets,
527
viewing effective permissions on an ob‐
ject, 516
Index | 799
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
825
|
site topology
changing interval to run KCC, 436
changing subnet’s site assignment, 406
configuring universal group caching, 400
creating a site, 393
creating a site link, 408
creating a site link bridge, 417
creating a subnet, 401
creating connection object, 428
delegating control of a site, 398
deleting a site, 397
deleting a subnet, 405
determining if KCC completes success‐
fully, 433
disabling automatic site coverage for do‐
main controller, 425
disabling KCC for a site, 434
enabling change notification for site link,
413
finding bridgehead servers for a site, 418
finding ISTG for a site, 430
finding site for a client, 426
finding site links for a site, 409
forcing host into a particular site, 427
listing connection objects for a server,
429
listing servers in, 421
listing sites in a domain, 395
listing subnets, 402
modifying cost for a site link, 411
modifying replication schedules, 414
modifying sites associated with a site
link, 410
moving domain controller to different
site, 422
renaming a site, 396
setting preferred bridgehead server, 420
transferring ISTG to another site, 431
triggering the KCC, 432
viewing site coverage for domain con‐
troller, 424
third-party tools, finding, 3
tombstone lifetime for a domain, modifying,
606
trusts
creating external trust, 36
creating shortcut trust between AD do‐
mains, 39
creating transitive trust between AD for‐
ests, 37
creating trust to a Kerberos realm, 41
enabling quarantine for, 48
enabling Selective Authentication, 50
enabling SID filtering, 47
removing, 46
resetting, 45
verifying, 44
viewing for a domain, 42
undeleting a container object, 605
users
applying fine-grained password policy to,
216
converting user object to inetOrgPerson
object, 199
copying group membership to another
user, 225
creating, 193
creating inetOrgPerson user, 197
creating large number of, 195
deleting, 201
determining last logon time, 237
disabled, finding, 220
enabling and disabling, 219
finding locked-out users, 209
finding users whose password is nearing
expiration, 231
finding with no recent logon, 239
modifying attribute for several at once,
200
modifying default display name when
creating, 191
moving, 204
preventing from changing password, 228
preventing password from expiring, 230
protecting against accidental deletion,
245
redirecting to alternative OU, 206
removing all group memberships from,
223
renaming, 207
requiring to change password at next log‐
on, 229
setting account expiration, 236
setting account options (userAccount‐
Control), 234
setting password, 227
unlocking, 211
800 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
826
|
updating profile attributes, 202
viewing fine-grained password policy for,
217
viewing group membership, 221
viewing managed objects, 242
viewing RODCs that cached password,
233
Client Access Server role (Exchange Server
2013), 674
client resolver cache, flushing, 483
CLM (Certificate Lifecycle Manager), 707
comma-separated values (see CSV files)
Commit Preview feature, using in FIM, 777
common name (cn)
setting for classSchema objects, 361
specifying for attribute, 359
Computer Migration Wizard, 281
computer objects, 273–304
adding or removing computer account from
a group, 285
attributes of, 273
binding to default container, 296
changing default container for, 298
changing maximum number user can join to
a domain, 290
creating, 274
creating computer for specific user or group,
276
disabling computer settings in a GPO, 322
domain controller, attributes of, 56
domain controller, storage of old names, 73
finding inactive or unused computers, 289
finding with particular OS, 294
identifying a computer’s role, 301
joining a computer to a domain, 278
listing all computer accounts in a domain,
300
migrating between domains, 147
modifying attributes of, 292
modifiable attributes, 293
moving computer within same domain, 280
moving to new domain, 281
operating system service-pack-level at‐
tributes of, adding to ADUC, 52
protecting against accidental deletion, 302
RDOC, attributes of Password Replication
Policy, 58
refreshing GPO settings on, 340
renaming, 283
resetting computer account, 287
restoration of, issues with, 587
testing secure channel for a computer, 286
userAccountControl attribute, 130, 234
computers
AD LDS instances installed on, listing, 633
deleting, 278
finding site for client computer, 426
using different domain suffix from their AD
domain, 493
Computers container, 297
concurrent binds, 114
conditional forwarding (DNS), configuring, 473
confidentiality bit, managing for schema at‐
tributes, 379
Configuration NC, 13, 607
Deleted Objects WKGUID, 297
enumerating well-known GUIDs in, 118
Partitions container, 608
replication to domain controllers, 55
Sites container, 389
objects in, 57
Subnets container, 402
well-known GUIDs in, 119
configuration set (AD LDS), creating new repli‐
ca of, 629
confirming import, 752
conflict objects
determining, 453
finding from replication collisions, 452
connected directory (CD) in FIM, 710
connection objects, 389
creating, 428
listing for a server, 429
management by KCC, 456
connector space (CS), 710, 712
deleting data in, 772
management agents and, 717
searching data in, 769
Connector Space Object Properties dialog box,
774
connectors, 714
constructed attributes, finding, 371
containers, 165
built-in, protection against accidental dele‐
tion of OUs, 187
changing default for computers, 298
default, binding to for computers, 296
deleting container with child objects, 155
Index | 801
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
827
|
loading container structure from AD into
FIM, 740
moving object to different container, 145
quota container, anatomy of, 540
undeleting a container object, 604
Control Panel
joining a computer to a domain, 279
renaming a computer, 283
controlling script, 755–760
ConvertTo-DnsServerPrimaryZone cmdlet, 468
Copy-GPO cmdlet, 310
copygpo.wsf script, 310
counters for performance objects, 555
createDialog attribute, 192
creategpo.wsf script, 309
createmigrationtable.wsf script, 317
createTimestamp attribute, 157
Credential Management (CM), 707
cross-forest trusts, 12
crossRef objects, 14, 149, 608
attributes of, 608
msDS-NC-Replica-Locations attribute, 613
removing for orphaned domain, 23
systemFlags attribute, 611
CS (see connector space)
cscript utility, 307
CSV comma-separated values) files
exporting objects to, 161
importing objects using PowerShell and, 162
csvde utility, 163
exporting objects to CSV files, 161
D
DACL (Discretionary Access Control List), 252
DAG (Database Availability Group), creating,
701
data binding
binding to default container for computers,
296
serverless bind, 4
using fast or concurrent bind, 114
Data Loss Prevention (DLP), 673
data sources in FIM, 710
flowing null value to a data source, 780
Database Availability Group (DAG), creating,
701
databases, 575
(see also DIT; ntds.dit file)
creating mailbox database, 703
determining size of AD database, 601
FIM platform, 707
dcdiag utility
checking for potential replication problems,
449
CheckSDRefDom, VerifyReplicas, and
CrossRefValidation tests, 617
determining if any problems with applica‐
tion partition, 617
determining if KCC completes successfully,
433
finding services advertised by domain con‐
troller, 79
troubleshooting domain controller promo‐
tion or demotion, 69
verifying promotion of domain controller,
70
verifying that domain controller can register
its resource records, 484
dcgpofix utility, 341
dcpromo utility, 19
log files, 69
Dcpromoui log files, 69
DCs (see domain controllers)
DDNS (dynamic DNS), 18, 480
preventing domain controller from dynami‐
cally registering certain resource records,
490
preventing domain controller from using to
register resource records, 489
defaultSecurityDescriptor attribute, classSche‐
ma object, 379
defragmentation
offline defrag of DIT to reclaim space, 597
performing online defrag manually, 592
Delegation of Control Wizard, 499
customizing, 509–511
using, 507
Delegwiz.inf file, customizing, 509–511
deleted objects, 576
anatomy of, 577
authoritative restore of, 586
garbage collection of tombstoned objects,
599
searching for, 602
undeleting a container object, 604
undeleting a single object, 603
Deleted Objects container, 576
deletegpo.wsf script, 311
802 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
828
|
Delta Import and Delta Synchronization run
profile, 763
loading telephoneNumber changes from AD
using, 765
delta synchronization, 715
description attribute (OUs), 167
design considerations for AD, 12
DHCP (Dynamic Host Configuration Protocol)
authorizing DHCP server, 495–497
restricting DHCP administrators, 497–499
dhcpClass class, 496
dhcpRoot objects, 496
diagnostics logging
enabling, 540
enabling for replication events, 450
summary of settings, 541
directories
in FIM, 710
synchronization from AD to HR database,
761
Directory Domains and Trusts MMC snap-in
removing a trust, 46
Directory Services Restore Mode (see DSRM)
Directory Sites and Services MMC snap-in
changing subnet’s site assignment, 406
disconnectors, 714
Discretionary Access Control List (DACL), 252
display names of Active Directory users, modi‐
fying, 191
distinguished name (DN), 5, 14
advanced attribute flow in FIM, 732
DIT (Directory Information Tree), 575
checking DIT file’s integrity, 589
determining amount of whitespace in, 596
determining size of ntds.dit file, 601
moving DIT files, 590
performing offline defrag to reclaim space,
597
repairing or recovering, 591
DLP (Data Loss Prevention), 673
DN (distinguished name), 5, 14
advanced attribute flow in FIM, 732
DNS (Domain Name System), 11, 461–494
allowing computers to use domain suffix dif‐
ferent from AD domain, 493
anatomy of DNS object, 462
clearing the cache, 483
configuring conditional forwarding, 473
configuring forwarding, 471
configuring zone transfers, 470
converting zone to an AD integrated zone,
468
creating and deleting resource records, 475
creating forward lookup zone, 463
creating reverse lookup zone, 464
delegating control of AD integrated zone,
474
deregistering domain controller’s resource
records, 488
domain controller covering for remote site,
publishing site-specific resource records,
424
domainDNS objects, 608
enabling DNS server debug log, 485
finding domain controllers and global cata‐
logs, 92
finding PDC Emulator FSMO role owner
via, 100
modifying DNS server configuration, 479
moving AD integrated zones into applica‐
tion partition, 469
preventing domain controller from dynami‐
cally registering all resource records, 489
querying resource records, 478
RegisterInDNS test, dcdiag, 69
registering domain controllers resource re‐
cords, 488
removing entries for demoted domain con‐
troller, 18
scavenging old resource records, 480
SRV records, modifying Priority and Weight
fields, 93
viewing DNS server statistics, 546
viewing server’s zones, 466
DNS Management MMC snap-in
clearing the DNS cache, 483
configuring conditional forwarding, 473
configuring forwarding, 472
configuring zone transfers, 470
converting zone to AD integrated zone, 468
creating and deleting resource records, 476
creating forward lookup zone, 463
creating reverse lookup zone, 464
delegating control of AD integrated zone,
474
enabling DNS server debug logging, 485
modifying DNS server configuration, 479
Index | 803
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
829
|
moving AD integrated zones into applica‐
tion partition, 469
querying resource records, 478
scavenging old resource records, 481
viewing server’s zones, 466
dnscmd utility
clearing the DNS cache, 483
configuring conditional forwarding, 473
configuring forwarding, 472
configuring zone transfers, 470
converting zone to AD integrated zone, 468
creating and deleting resource records, 476
creating forward lookup zone, 463
creating reverse lookup zone, 465
enabling DNS server debug logging, 486
modifying DNS server configuration, 480
moving AD integrated zones into applica‐
tion partition, 469
scavenging old resource records, 481
viewing a server’s zones, 466
viewing DNS server performance statistics,
546
dNSHostName attribute, 494
dnsNode objects, 462
dnsRoot attribute, crossRef object, 611
dnsZone objects, 462
domain controllers, 55–101
anatomy of, 56
changing preference for, 93
checking if can be upgraded to Windows
Server 2003 or 2008, 34
configuring to cover multiple sites, 423
configuring to use external time source, 83
deleted, restoring in Windows Server 2012,
80
demoting, 18
demoting when removing a domain, 21
demoting Windows Server 2012 domain
controller, 66
determining if global catalog (GC) promo‐
tion is complete, 89
determining if two domain controllers are in
sync, 439
determining size of AD database, 601
disabling automatic site coverage for, 425
enabling /3GB switch to increase LSASS
cache, 86
enabling and disabling global catalog (GC),
86
enabling support for claims and compound
authentication, 535
finding closest, 75
finding for a domain, 74
finding FSMO role holders, 95
finding number of logon attempts made
against, 85
finding services advertised by, 79
finding site for, 76
finding via DNS, 92
forcing replication between two partners,
442
FSMO roles on, 387
or global catalogs, finding in a site, 91
listing connection objects associated with,
429
listing replication partners for, 455
moving to different site, 77, 422
nonauthoritative restore, 585
predefined partitions hosted by, 607
preventing from dynamically registering all
DNS resource records, 489
preventing from dynamically registering cer‐
tain DNS resource records, 490
promoting a server to, 17, 58
promoting a server to RODC, 59
performing two-stage installation, 61
promoting server to Windows Server 2012
domain controller from media, 64
promotion or demotion problems, trouble‐
shooting, 68
promotion or demotion, automating, 67
querying for 5807 events, 403
registering DNS resource records, 488
registration of DNS resource records, 484
removing unsuccessfully demoted domain
controller, 71
renaming, 73
replication on, 444
(see also replication)
represented in site topology by server object,
421
resetting TCP/IP stack, 82
restarting in DS Repair Mode, 582–584
site coverage for, 424
targeting specific, 4
transferring FSMO roles, 97
verifying promotion, 70
viewing replication status for, 440
804 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
830
|
viewing unreplicated changes between, 441
domain functional levels
raising to Windows Server 2012, 27
summary of, 27
domain local groups, 248
Domain Naming FSMO role, 22, 97
finding holders of, 95
Domain NC, 14, 607
domainDNS and crossRef objects in, 608
enumerating and connecting to well-known
GUIDs in, 118
LostAndFound container, 454
msDS-LogonTimeSyncInterval attribute, 239
RDOCs versus writable domain controllers,
57
well-known GUIDs, 297
well-known GUIDs in, 119
domainDNS objects, 291
attributes of, 608
msDS-Behavior-Version attribute, 27
wellKnownObjects attribute, 298
DomainDNSZones application partition, re‐
moving for orphaned domain, 23
DomainRole attribute, 302
domains
anatomy of, 14
changing maximum number of computers
user can join to domain, 290
computers using domain suffix different
from their AD domain, 493
creating, 19
creating external trust to, 35
creating shortcut trust between two AD do‐
mains, 38
defined, 11
enabling claims for devices in, 536
enabling strong authentication, 521
enumerating OUs in, 168
finding domain controllers for, 74
finding duplicate SIDs in, 51
finding GPOs in a domain, 307
finding holders of domain-level FSMO roles,
96
finding in a forest, 23
joining a computer to, 278
listing all computer accounts in a domain,
300
listing sites in, 395
modifying tombstone lifetime for, 605
moving a group to another domain, 257
moving a group within a domain, 256
moving computer to new domain, 281
moving computer within same domain, 280
moving object to different domain, 147
preparation for Exchange Server, 676
preparing for Windows Server 2012 with
AdPrep, 30
determining if AdPrep has completed, 32
preparing for Windows upgrade, 352
referencing an external domain, 149
removing, 20
removing orphaned domain, 22
renaming, 26
searching for objects in, 120
setting reference domain for application par‐
tition, 620
viewing domain-wide account lockout and
password policies, 213–215
viewing trusts for, 41
viewing trusts for a domain, 41
DOMAIN_CONTROLLER_INFO flags, 80
dsacls utility
configuring permission inheritance, 517
creating a computer for specific user or
group, 276
delegating control for managing group
membership, 263
delegating control of a site, 398
delegating control of AD integrated zone,
475
delegating control of managing application
partition, 622
delegation of control over objects, 508
managing AD LDS permissions, 653
protecting a group against accidental dele‐
tion, 270
protecting computer against accidental dele‐
tion, 303
protecting OU against accidental deletion,
186
protecting user against accidental deletion,
245
resetting object’s ACL to default defined in
schema, 521
viewing ACL for an object, 513
viewing permissions of a group, 251
dsadd utility
creating a computer, 275
Index | 805
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
831
|
creating a user, 193
creating an OU, 166
creating groups, 249
creating large number of users, 195
dsamain utility, mounting AD snapshot, 580
dsdbutil utility
changing ports used by AD LDS instance,
633
listing AD LDS instances installed on a com‐
puter, 633
dsget utility
determining if group caching is enabled, 266
finding quota usage for security principals,
571
viewing direct members of a group, 252
viewing nested members of a group, 254
viewing site properties, 395
DsGetDcName method, 75
DOMAIN_CONTROLLER_INFO structure
returned by, 80
DsGetSiteName method, 426
dSHeuristics attribute, 507
dsmgmt utility, 636
dsmod utility
adding and removing group members, 255
changing scope or type of a group, 259
changing tombstone weight in quota calcu‐
lations, 569
enabling and disabling global catalog (GC),
87
enabling and disabling users, 219
modifying an object, 134
modifying an OU, 180
modifying group attributes, 261
preventing user’s password from expiring,
230
renaming users, 207
requiring user to change password at next
logon, 229
resetting computer account, 288
restricting DHCP administrators, 498
setting user’s account to expire, 236
setting user’s password, 227
setting user’s profile attributes, 202
user options for setting userAccountControl,
234
dsmove utility
moving a computer within same domain,
281
moving a group within a domain, 256
moving an OU, 177
moving domain controller to a different site,
422
moving domain controller to different site,
77
moving object to different OU or container,
146
moving users, 204
renaming an object, 151
renaming an OU, 179
dsquery utility
determining if group caching is enabled, 266
determining number of child units for an
OU, 181
enumerating all GC servers in a forest, 90
enumerating objects in an OU, 171
enumerating OUs in a domain, 168
finding AD classes, 375
finding application partitions hosted by do‐
main controller, 615
finding application partitions in a forest, 610
finding computers with particular OS, 295
finding conflict objects, 452
finding disabled users, 220
finding GPOs in a domain, 308
finding holders of individual FSMO roles, 96
finding inactive or unused computers, 289
finding linked attributes, 374
finding mandatory and optional attributes of
a class, 377
finding nonreplicated and constructed at‐
tributes, 372
finding orphaned objects, 454
finding quotas assigned to security principal,
567
finding Schema FSMO role owner, 386
finding site links for a site, 409
finding users with no recent logon, 239
finding users with passwords nearing expira‐
tion, 231
listing replication partners for domain con‐
troller, 455
listing servers in site topology, 421
listing sites in a forest, 395
listing subnets, 402
modifying attribute for several users at once,
200
806 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
832
|
returning distinguished name of server ob‐
ject, 78
searching for objects in a domain, 120
searching the global catalog, 123
searching with bitwise filter, 129
viewing an attribute, 358
viewing class attributes, 362
viewing created and last-modified time‐
stamps of an object, 156
viewing object’s attributes, 107
-attr option, 110
dsrevoke utility, revoking delegated permis‐
sions, 512
DSRM (Directory Services Restore Mode), 17
nonauthoritative restore by rebooting DC in,
585
rebooting into, during complete authorita‐
tive restore, 588
resetting administrator password, 584
restarting domain controller in, 582–584
stopping and starting of AD DS, 576
dsrm utility
deleting a computer, 278
deleting a subnet, 405
deleting a user, 201
deleting an OU, 174
deleting container with child objects, 155
deleting objects in an OU, 173
Dynamic Access Control
configuring central access rule, 533
creating central access policy, 534
creating new claim type for, 531
creating resource property for, 532
dynamic DNS (see DDNS)
Dynamic Host Configuration Protocol (see
DHCP)
dynamic objects
creating, 140
modifying default TTL settings, 144
refreshing, 142
dynamicObjectDefaultTTL attribute, 141
E
EAC (see Exchange Administration Center)
effective permissions of an object, 516
email
configuring mailbox limits, 698
creating a mailbox database, 703
creating an address list, 700
deleting a user’s mailbox, 691
enabling message tracking on Exchange
Server, 705
mail-disabling a user, 688
mail-enabling a user, 687
mailbox-enabling a user, 689
moving a mailbox, 693
viewing mailbox sizes and message counts,
695
EMS (see Exchange Management Shell)
EMT (Exchange Management Tools), installing,
683
entryTTL attribute, 141, 143
enumprop command, 3
ESE (Extensible Storage Engine), 575
esentutl database utility, 594
event codes for DNS debug logging, 486
Event Viewer MMC
checking Directory Services Event Log for
global catalog server, 89
determining if KCC completes successfully,
433
event-based synchronization, identity manage‐
ment products, 714
EventCombMT utility, 212
Everyone security principal, 353
Exchange Administration Center (EAC), 674
accessing, 675
configuring mailbox limits, 698
creating a Database Availability Group
(DAG), 701
creating a mailbox database, 703
creating an address list, 700
deleting a user’s mailbox, 692
enabling message tracking, 705
mail-disabling a user, 688
mail-enabling a user, 687
mailbox-enabling a user, 689
moving a mailbox, 693
Exchange Management Shell (EMS), 674
finding Exchange Server cmdlets, 675
Exchange Server 2013, 673–706
architecture, 674
configuring mailbox limits, 698
creating a mailbox database, 703
creating an address list, 700
creating Database Availability Group (DAG),
701
creating unattended installation files for, 682
Index | 807
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
833
|
deleting a user’s mailbox, 691
enabling message tracking, 705
enabling or disabling anti-malware scan‐
ning, 704
Exchange Server and Active Directory, 674
finding Exchange Server cmdlets, 675
installing Exchange Management Tools, 683
installing first server, 679
mail-disabling a user, 688
mail-enabling a user, 687
mailbox-enabling a user, 689
preparing Active Directory for Exchange,
676
services, 685
stopping and starting Exchange Server, 684
viewing mailbox sizes and message counts,
695
expensive or inefficient LDAP queries, logging,
549–551
explicit disconnectors, 714
Extensible Storage Engine (ESE), 575
F
fast binds, 114
federated trusts, 657
Federated Web SSO design, 657
FGPPs (see fine-grained password policies)
filters
applying WMI filter to a GPO, 333
LDAP search filters, 121
searching with bitwise filter, 128
WMI, 305
creating, 332
FIM (see Forefront Identity Manager)
findexpacc utility, 231
fine-grained password policies (FGPPs), 215
applying FGPP to group object, 270
applying FGPP to user object, 216
creating, 342
editing, 343
viewing FGPP in effect for user account, 217
Flexible Single Master Operation (see FSMO
roles)
Forefront Identity Manager (FIM), 707–786
committing changes to individual identities
using Commit Preview feature, 777
configuring run profile for initial load of da‐
ta from SQL Server MA, 737
configuring run profile to load container
structure from AD, 740
configuring run profile to load telephone‐
Number from AD, 762
connector, 714
connector space (CS), 712
creating a controlling script, 755–760
creating Active Directory management
agent, 724
creating rule profile for provisioning, 747
executing provisioning rule, 749
creating rule profile to export objects from
AD MA to AD, 750
creating run profile script, 753
creating SQL Server management agent, 722
defining advanced import attribute flow, 731
deleting data in connector space and meta‐
verse, 772
enabling directory synchronization from AD
to HR database, 761
exporting and encoding accountExpires at‐
tribute, 784
exporting objects to AD using export run
profile, 752
exporting telephoneNumber data to SQL
Server DB, 767
using run profile, 768
extending object types to include new at‐
tribute, 773
flowing null value to a data source, 780
implementing advanced attribute flow rules
extension, 733–736
importing and decoding accountExpires at‐
tribute, 782
importing data, 710
loading initial AD container structure into
FIM using run profile, 742
loading initial SQL Server database data into
FIM using run profile, 739
loading telephoneNumber from AD using
run profile, 765
management agents (MAs), 717, 717
attribute flow rules, 718
example scenario, 720
Metaverse Designer, 718
run profiles, 717
metaverse (MV), 712
passing data between rules extensions using
transaction properties, 778
808 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
834
|
previewing changes to configuration, 774
primer on, 710
projection and joins, 712
requirements for FIM 2010 R2, 709
searching data in connector space, 769
searching data in metaverse, 771
setting up advanced export attribute flow in
Active Directory, 736
setting up metaverse object deletion rule,
726
setting up simple export attribute flow to
AD, 729
setting up simple import attribute flow, 727
setting up SQL Server MA to project objects
to metaverse, 743
state-based synchronization, 715
synchronization and reconciliation of identi‐
ty information, 709
using single rules extension to affect multi‐
ple attribute flows, 779
writing rules extension to provision user ob‐
jects, 744–747
ForeignSecurityPrincipal, 645
forests
anatomy of, 13
creating, 15
creating domains in, 19
creating transitive trust between two AD for‐
ests, 37
creating UPN suffix for, 243
defined, 11
disabling replication on, 444
finding application partitions in, 609
finding domains in, 23
finding global catalog servers in, 90
finding holders of forest-level FSMO roles,
96
listing sites in, 395
modifying default LDAP query policy, 157
preparation for Exchange Server, 676
preparing for Windows Server 2012 with
AdPrep, 30
determining if AdPrep has completed, 32
preparing for Windows upgrade, 352
raising functional level of Windows Server
2008 or 2008 R2 forest, 28
removing, 18
forward link, 375
forward lookup zones, 463
forwarding (DNS)
configuring, 471
configuring conditional forwarding, 473
FQDN (fully qualified domain name), 73
FSMO (Flexible Single Master Operation) roles,
56
demotion of domain controller and, 67
Domain Naming FSMO, 22
finding PDC Emulator role owner via DNS,
100
finding role holders, 95
identifying a computer’s role, 301
managing Schema FSMO, 386
seizing a FSMO role, 99
summary of, 97
transferring a FSMO role, 97
fSMORoleOwner attribute, 76, 97
fsutil utility, creating reserve file, 595
full synchronization, 715
fully qualified domain name (FQDN), 73
functional levels
domain, 27
forest, 28
G
garbage collection, 593
changing interval for, 598
diagnostics logging option, 596
logging number of expired tombstone ob‐
jects, 600
GCs (global catalogs)
determining if GC promotion is complete,
89
disabling global catalog requirement for user
logon, 95
enabling and disabling, 86
finding domain controllers or global catalogs
in a site, 91
finding global catalog servers in a forest, 90
finding via DNS, 92
modifying set of attributes stored on, 369
searching, 122
Get-ADDomain cmdlet, 25
-Identity switch, 96
finding holders of FSMO roles, 97
Get-ADDomainController cmdlet
-Discover switch, 75
-Filter switch, 74, 90, 91
-Server switch, 76, 90
Index | 809
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
835
|
Get-ADForest cmdlet, 24, 29
finding forest-level FSMO role holders, 96
finding holders of FSMO roles, 97
Get-ADObject cmdlet
-Filter switch, 111
-LDAPFilter switch, 112, 129
-SearchBase switch, 125
Get-ADOrganizationalUnit cmdlet
-Filter parameter, 169
-LDAPFilter switch, 170
-SearchBase switch, 170
Get-ADPermission cmdlet, 251
Get-ADReplicationAttributeMetadata cmdlet,
457
Get-ADReplicationConnection cmdlet, 456
Get-ADReplicationPartnerMetadata cmdlet,
441
Get-ADReplicationSite cmdlet, 395
Get-ADReplicationSubnet cmdlet, 403
Get-ADReplicationUpToDatenessVectorTable
cmdlet, 440
Get-ADRootDSE cmdlet, 105
Get-ADUser cmdlet, 107
Get-Command cmdlet, 676
Get-DnsServerZone cmdlet, 466
Get-ExCommand cmdlet, 676
Get-GPOReport cmdlet, 313
Get-MailboxStatistics cmdlet, 697
Get-WinEvent cmdlet, 405
GetADObject cmdlet
–IncludeDeletedObjects switch, using LDAP
controls, 113
getreportsforgpo.wsf script, 313
GetUserInfo utility, 221
global catalogs (see GCs)
global groups, 248
globally unique identifiers (see GUIDs)
GlobalNamesZone (GNZ), 461
GP BPA (Group Policy Best Practice Analyzer),
307
GPC (groupPolicyContainer) objects, 305
gpfixup.exe utility, 26
gpLink attribute, 185, 324
GPMC (see Group Policy Management Console
MMC snap-in)
GPME (see Group Policy Management Editor)
GPOs (Group Policy Objects), 305–346
AdPrep switch updating permissions on, 31
applying security filter to a GPO, 327
applying WMI filter to a GPO, 333
assigning logon/logoff and startup/shut‐
down scripts in, 320
backing up, 335
blocking inheritance of GPOs on an OU, 325
configuring loopback processing for, 334
copying, 310
creating, 309
creating a WMI filter, 332
creating custom settings for, 317–319
creating migration table for, 316
delegating administration of, 329
deleting, 311
disabling user or computer settings in, 322
Domain Controllers OU and, 56
editing a fine-grained password policy, 343
enabling auditing of AD LDS access, 655
enabling auditing of changes to Registry
keys, 564
enabling GPO client logging, 543
enforcing settings of GPO link, 326
finding in a domain, 307
importing security template, 331
importing settings into a GPO, 314
inability to link to built-in containers, 297
installing applications with, 321
linking to OUs, 185
listing links for a GPO, 323
managing, 306
modifying settings, 313
refreshing GPO settings on a computer, 340
restoring, 337
restoring default GPO, 341
reviewing settings, 312
simulating the RSoP, 338
viewing effective POS for a user, 345
GPPs (Group Policy Preferences), 306
gpresult utility, 339
GPT (Group Policy Template) files, 305
gpupdate utility, 340
group objects, 248
(see also groups)
attributes of, 248
memberOf attribute, 253
primaryGroupToken attribute, 265
Group Policy Best Practice Analyzer (GP BPA),
307
Group Policy Editor (GPE), 306
810 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
836
|
Group Policy Management Console (GPMC)
MMC snap-in, 306, 307
applying central access policy, 535
applying security filter to a GPO, 328
applying WMI filter to a GPO, 333
assigning logon
logoff and startup/shutdown scripts in
GPO, 320
backing up a GPO, 335
blocking inheritance of GPOs on an OU, 325
configuring domain controller to cover mul‐
tiple sites, 423
configuring loopback processing for a GPO,
334
copying a GPO, 310
creating a GPO, 309
creating GPO link to an OU, 324
creating migration table, 316
delegating administration of GPOs, 329
deleting a GPO, 311
disabling user or computer settings in a
GPO, 322
enabling auditing of directory access, 561
enabling claims for devices in domain, 536
enabling domain controller support for
claims and compound authentication,
536
enabling strong domain authentication, 522
enforcing settings of a GPO link, 326
finding GPOs in a domain, 308
importing security template into a GPO, 331
importing settings into a GPO, 314
installing applications with a GPO, 321
linking a GPO to an OU, 185
listing links for a GPO, 323
modifying GPO settings, 313
modifying Kerberos settings, 529
preventing domain controller from dynami‐
cally registering certain resource records,
490
restoring a GPO, 337
reviewing GPO settings, 312
Sample Scripts, 307
simulating the RSoP, 338
updating permissions on GPOs with Ad‐
Prep, 31
viewing domain-wide account lockout and
password policies, 213
Group Policy Management Editor (GPME), 306
Group Policy Objects (see GPOs)
Group Policy Preferences (GPPs), 306
Group Policy Template (GPT) files, 305
groupPolicyContainer (GPC) objects, 305
groups, 247–271
adding and removing members, 254
adding or removing computer account, 285
applying fine-grained password policy to
group object, 270
changing scope or type, 259
changing user’s primary group, 223
copying user’s group membership to another
user, 225
creating, 249
creating computer for specific group, 276
creating or deleting AD LDS groups, 643
delegating control for managing member‐
ship, 263
DHCP, adding or removing members, 498
enabling universal group membership cach‐
ing, 266
group object attributes, 248
included in Admin SD Holder processing,
525
managing AD LDS group memberships, 644
modifying attributes, 260
moving to another domain, 257
moving within a domain, 256
protecting from accidental deletion, 269
removing all group memberships from a
user, 222
resolving primary group ID for a user, 264
restoration of, issues with, 587
restoring deleted group, 268
streamlining number a user belongs to, 530
viewing direct members of, 252
viewing nested members of, 253
viewing permissions of, 251
viewing user’s group membership, 221
groupType attribute, 250
changing type of a group, 260
GUI-based tools, 2
preparing Active Directory for Exchange,
676
running with alternate credentials, 3
signing and encrypting LDAP traffic, 503
GUIDs (globally unique identifiers)
connecting to an object GUID, 116
connecting to well-known GUID, 117
Index | 811
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
837
|
GPO, stored in gpLink attribute, 324
object renaming and, 152
schemaIDGUID for classes, 361
well-known GUIDs that map to container
objects, 297
H
homeDirectory attribute, 203
homeDrive attribute, 203
hosts, forcing into a site, 427
I
IADs interfaces, 116
IADsContainer::GetObject method, 116
IADsTool interface, 426
IADsUser::AccountDisabled property, 219
IADsUser::IsAccountLocked method, 211
identity data, synchronization and reconcilia‐
tion of (see Forefront Identity Manager)
Identity Lifecycle Manager (ILM), 707
(see also Forefront Identity Manager)
IIS (Internet Information Services)
installing, 658
Import-GPO cmdlet, 315
inefficient or expensive LDAP queries, logging,
549–551
inetOrgPerson class, 193
inetOrgPerson objects
converting user objects to or from, 198
creating, 196
information sources for AD tasks, 7
Infrastructure FSMO role, 97
finding holders of role, 96
running AdPrep to prepare domain for Win‐
dows Server 2012, 30
inheritance, 103
blocking inheritance of GPOs on an OU, 325
configuring permission inheritance, 516
Install-ADDSDomain cmdlet, 20
Install-ADDSDomainController cmdlet, 60, 68
Install-ADDSForest cmdlet, 17
Inter-Site Topology Generator (ISTG), 78
finding for a site, 429
transferring to another site, 431
Internet Information Service (IIS) Manager
MMC snap-in, 658
Internet Information Services (see IIS)
intra-site replication
configuring for AD LDS, 648
invoke-command cmdlet, 68
Invoke-GPUpdate cmdlet, 341
ipconfig utility, 483
isDefunct attribute, 383
isGlobalCatalogReady attribute (RootDSE), 89
isMemberOfPartialAttributeSet attribute, 370
ISTG (see Inter-Site Topology Generator)
I_NetLogonControl2 method, 85
J
joins, 712
K
KCC (Knowledge Consistency Checker), 78
changing interval at which it runs, 436
creating and maintaining connection ob‐
jects, 456
determine if completing successfully, 433
disabling for a site, 434
triggering, 432
Kerberos, 502
creating trust to Kerberos realm, 40
enabling Kerberos logging, 545
forcing to use TCP, 527
modifying settings, 529
resetting Kerberos realm trust, 45
support for claims, compound authentica‐
tion, and Kerberos armoring, 536
verifying a Kerberos trust, 44
viewing access tokens, 530
viewing and purging Kerberos tickets, 526
kerbtray utility, 526
klist utility, 527
L
lastLogon attribute, 238
lastLogonTimestamp attribute, 237, 239
LDAP (Lightweight Directory Access Protocol),
103
configuring attribute store for AD FS, 661
controls supported by Active Directory, 113
deleting an OU with an LDAP utility, 174
disabling LDAP signing, 504
enabling anonymous LDAP access, 505
812 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
838
|
logging inefficient and expensive LDAP
queries, 549–551
modifying default query policy, 157
or LDAP over SSL, changing ports used by
AD LDS instance, 633
over SSL/TLS, 503
paged searching support via LDAP controls,
125
query policy settings, 158
search parameters for attribute-based query,
127
searches, using base DN, search scope, and
search filter, 121
securing LDAP traffic with SSL, TLS, or
signing, 503
using LDAP controls, 112
using LDAP filtering in PowerShell, 112
using STATS control to view query statistics,
551–554
lDAPAdminLimits attribute, 157
lDAPDisplayName attribute
attributeSchema object, 359
classSchema objects, 361
LDIF (LDAP Data Interchange Format), 4, 197
(see also ldifde utility)
create_crossref_object.ldf file, 149
create_dynamic_object.ldf file, 141
create_object.ldf file, 132
creating large number of users, file for, 195
dynamically_link_class.ldf file, 139
exporting objects to LDIF file, 159
files for AdPrep, 353
importing objects using LDIF file, 160
modify_object.ldf file, 134
MS-ADLDS-DisplaySpecifiers.LDF file, 649
optional files provided with AD LDS instal‐
ler, 641
refresh_dynamic_object.ldf file, 143
schema extension files, 353
ldifde utility, 5
adding fields to AD Users and Computers,
53
adding new attribute to the schema, 355
adding new class to the schema, 360
changing computer account quota, 291
changing garbage collection interval, 599
changing inter-site replication interval, 447
changing intra-site replication notification
interval, 445
changing password for AD LDS user, 641
changing tombstone weight in quota calcu‐
lations, 569
computers using different domain suffix
from AD domain, 494
configuring universal group caching for a
site, 400
copying attributes when duplicating a user,
365
creating a site, 394
creating a site link, 408
creating a site link bridge, 417
creating a subnet, 401
creating an object, 132
creating dynamic object, 141
creating inetOrgPerson user, 197
creating large number of users, 195
deactivating classes and attributes, 382
disabling KCC for a site, 434
dynamically linking auxiliary class to exist‐
ing object instance, 139
enabling group caching, 267
exporting objects to LDIF file, 159
extending AD LDS schema, 635
importing data into AD LDS instance, 648
importing objects using LDIF file, 160
including attribute as part of ANR, 367
indexing an attribute, 363
modifying an object, 134
modifying computer object’s attributes, 293
modifying cost for a site link, 412
modifying group attributes, 261
modifying set of attributes stored on global
catalog, 370
modifying sites associated with a site link,
410
modifying tombstone lifetime for a domain,
606
online defrag, manual, 593
referencing an external domain, 150
refreshing a dynamic object, 143
reloading the schema, 384
setting default quota for security principals,
570
setting preferred bridgehead server for a site,
420
LDP
accessing AD snapshot data, 581
adding AD LDS application partitions, 636
Index | 813
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
839
|
binding to default container for computers,
296
changing default container for computers,
298
connecting to object GUID, 116
connecting to well-known GUID, 118
counting objects in Active Directory, 110
creating dynamic object, 140
deleting an object, 153
determining number of child objects for an
OU, 181
fast or concurrent bind, 115
finding application partitions hosted by a
server, 615
finding application partitions in a forest, 610
finding conflict objects from replication col‐
lisions, 452
finding linked attributes, 374
finding nonreplicated and constructed at‐
tributes, 371
managing AD LDS permissions, 652
performing online defrag manually, 592
redirecting users to alternative OU, 205
refreshing a dynamic object, 142
renaming an object, 151
searching for large number of objects, 124
searching for objects in a domain, 120
searching the global catalog, 122
searching with attribute-scoped query, 126
searching with bitwise filter, 128
using LDAP controls, 112
using STATS control to view LDAP query
statistics, 552
viewing created and last-modified time‐
stamps of an object, 156
viewing object metadata, 456
viewing object’s attributes, 106
viewing RootDSE object, 104
leaf nodes, 165
licensingSiteSettings objects, 389
Lightweight Directory Access Protocol (see
LDAP)
lingering objects, 451, 577
linked attributes, finding, 373
linking GPOs, 305
creating GPO link to an OU, 324
links
creating a site link, 407
enforcing settings of GPO link, 326
listing for a GPO, 323
restoration of GPOs and, 338
List Object Access mode, 523
listastallgpos.wsf script, 308
LM authentication, 522
Local Mailbox Move Wizard, 695
lockoutDuration attribute, 210
lockouts
finding locked-out users, 209
troubleshooting account lockout problems,
211
unlocking a user, 210
viewing domain-wide lockout and password
policies, 213–215
LockoutStatus utility, 212
lockoutTime attribute, 210
logging
circular, 575
configuring for Active Directory Federation
Services (AD FS), 671
directory access and modifications, 562
enabling diagnostics logging, 540
enabling DNS server debug logging, 485
event codes, 486
enabling GPO client logging, 543
enabling inefficient and expensive LDAP
query logging, 549–551
enabling Kerberos logging, 545
enabling NetLogon logging, 542
enhanced logging of replication events, 450
message tracking log for Exchange Server,
705
tombstone objects removed in each garbage
collection, 600
using Perfmon Trace Logs to monitor AD,
557–558
logonHours attribute, user object, 241
logons
determining user’s last logon time, 237
finding number of attempts made against a
domain controller, 85
finding users who haven’t logged on recently,
238
NetLogon logging, 542
requiring user to change password at next
logon, 229
user, disabling global catalog requirement
for, 95
814 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
840
|
viewing and modifying user’s permitted log‐
on hours, 240
loopback processing, configuring for a GPO,
334
loose replication consistency, 450
LostAndFound container, 454
LSASS cache, increasing, 86
M
machine account quota, 290
mail and mailboxes (see email)
mail attribute
changing, 207
mailbox database, creating, 703
Mailbox Server role (Exchange Server 2013),
674
mailing lists for Active Directory, 9
managedBy attribute, 184, 243
group objects, 264
site objects, 398
managedObjects attribute, 184, 242
management agents (MAs), 717
attribute flow rules, 718
creating Active Directory management
agent, 724
creating SQL Server management agent, 722
example scenario, synchronizing AD from
HR database, 720
Metaverse Designer, 718
run profiles, 717
MAP (Microsoft Assessment and Planning)
tools, 35
MaxTokenSize value, 530
mayContain attribute, classSchema object, 378
Measure-Object cmdlet, 182
member attribute group object, 222
member attribute, group object, 253, 254
memberOf attribute, 222, 226
group objects, 253
user objects, 265
memberof utility, 221
viewing nested members of a group, 254
message counts, viewing for mailboxes on a
server, 695
message tracking in Exchange Server, 705
metadata, viewing object metadata, 456
metadirectory synchronization tools, 708
metaverse (MV), 712
creating Provisioning-Rules-Extension, 745
deleting data in, 772
mapping attributes from connected system
into, 728
searching data in, 771
simple export attribute flow to AD MA, 730
SQL Server MA projecting objects to, 743
Metaverse Designer, 718
metaverse object deletion rule, 726
Microsoft Assessment and Planning Solution
Accelerator, 35
Microsoft Developer Network (see MSDN)
Microsoft Exchange Server 2013 (see Exchange
Server 2013)
Microsoft Forefront Identity Manager (see Fore‐
front Identity Manager)
Microsoft Identity Lifecycle Manager (ILM),
707
(see also Forefront Identity Manager)
Microsoft Knowledge Base (MS KB) articles, 1,
7
Microsoft Management Console (MMC), run‐
ning with alternate credentials, 4
Microsoft SQL Server (see SQL Server)
Microsoft System Center Operations Manager
(OpsMgr), 559
migration tables, 311
creating for GPO, 316
mmc command, 4
modifyTimestamp attribute, 157
Move-ADDirectoryServer cmdlet, 78
Move-ADDirectoryServerOperationMasterRole
command, 98, 100
MS KB (see Microsoft Knowledge Base articles)
ms-DS-MachineAccountQuota attribute, 291
msconfig utility, restarting domain controller in
DSRM, 583
MSDN (Microsoft Developer Network), 1
information resources on Active Directory, 7
msDS-AllowedDNSSuffixes attribute, 494
msDS-Approx-Immed-Subordinates attribute,
182
example of constructed attribute, 373
msDS-DefaultQuota attribute, 570
msDS-HasInstantiatedNCs attribute, 617
msDS-LogonTimeSyncInterval attribute, 239
msDS-NC-Replica-Locations attribute, 611
msDS-NeverRevealGroup attribute (RODC), 63
msDS-PasswordSettingsObjects, 343
msDS-Preferred-GC-Site attribute, 268
Index | 815
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
841
|
msDS-PSOApplied attribute, 217
msDS-QuotaContainer objects, 540
msDS-QuotaControl objects, 540
msDs-QuotaEffective attribute, 571
msDS-QuotaTrustee attribute, 568
msDs-QuotaUsed attribute, 571
msDS-ReplAttributeMetaData attribute, 457
msDS-ReplAuthenticationMode, 651
description of values, 652
msDS-ReplValueMetaData attribute, 457
msDS-ResultantPSO attribute, 217
msDS-RevealedDSAs attribute, 232, 304
msDS-RevealedUsers attribute, 304
msDS-RevealOnDemandGroup attribute
(RODC), 64
msDS-SDReferenceDomain attribute, 620
msDS-TombstoneQuotaFactor attribute, 568
msDs-TopQuotaUsage attribute, 572
msDS-User-Account-Control-Computed at‐
tribute, 211
msDS-UserAccountDisabled attribute, 642
msExchPrivateMDB class, 704
multimaster replication, 631
mustContain attribute, classSchema object, 378
MV (see metaverse)
N
namespaces, DNS, 11
naming contexts (NCs), 13
replication of Configuration and Schema
NCs to all domain controllers, 55
NetBIOS name of a domain, 14, 24
netdom utility
creating an external trust, 36
creating shortcut trust between AD do‐
mains, 39
creating transitive trust between AD forests,
37
creating trust to a Kerberos realm, 41
disabling SID filtering, 48
enabling quarantine for a trust, 48
enabling Selective Authentication for a trust,
50
enabling SID filtering for a trust, 47
enumerating trusts for a domain, 42
finding holders of FSMO roles, 96
joining a computer to a domain, 279
removing a trust, 46
renaming a computer, 284
renaming domain controller, 73
resetting a trust, 45
resetting computer account, 288
verifying a trust, 44
NetLogon service, 490
enabling logging, 542
netlogon.log file, 403
NO_CLIENT_SITE entries, 404
netmon utility, diagnosing DC promotion prob‐
lems, 69
netsh utility
authorizing a DHCP server, 495
resetting TCP/IP stack on domain controller,
82
Network Monitor program (netmon), 69
New-ADCentralAccessRule cmdlet, 533
New-ADClaimType cmdlet, 531
new-ADComputer cmdlet, 275
New-ADFineGrainedPasswordPolicy cmdlet,
343
New-ADObject cmdlet
-Path switch, 133
New-ADOrganizationalUnit command, 167
New-ADReplicationSiteLink cmdlet, 408
New-ADReplicationSiteLinkBridge cmdlet, 417
New-ADReplicationSubnet cmdlet, 402
New-ADUser cmdlet, 163
switches, 194
New-GPLink cmdlet, 325
nltest utility
checking if global catalog (GC) promotion is
complete, 89
deregistering domain controller’s resource
records, 488
enabling NetLogon logging, 542
enumerating trusts for a domain, 42
switches to modify default behavior, 43
finding closest domain controller, 75
finding domain controller’s site, 76
finding number of attempted logons against
a domain controller, 85
finding services advertised by domain con‐
troller, 79
finding site for a client, 426
registering DC’s resource records, 488
resetting computer account, 288
testing secure channel for a computer, 286
viewing site coverage for domain controller,
424
816 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
842
|
wrapper for DsGetDcName method, 75
nonauthoritative restore of domain controller,
585
nonreplicated attributes, finding, 371
nontransitive trusts, 15
normal connectors, 714
normal disconnectors, 714
NO_CLIENT_SITE entries, 403
example from netlogon.log file, 404
nslookup utility
finding PDC Emulator FSMO role owner,
100
querying DNS SRV records, 92
querying resource records, 478
NT LAN Manager (NTLM) authentication, 522
NTDS counters, 555
NTDS Site Settings object
msDS-Preferred-GC-Site attribute, 268
options attribute, 268
ntds.dit file, 575
checking integrity of, 589
contained in AD snapshot, mounting, 581
creating reserve file on disk containing, 595
determining size of, 601
moving, 590
optimizing disk space used by, performing
online defrag, 592
performing database recovery on, 593
replication of, and promotion of server to
domain controller, 64
nTDSConnection objects, 390
attributes of, 393
nTDSConnection objects, attributes of, 393
nTDSDSA objects, 56, 71, 390
attributes of, 57, 392
distinguishing domain controllers, 422
for replica servers, 613
msDS-HasInstantiatedNCs attribute, 617
queryPolicyObject attribute, 159
representing domain controllers, 76
nTDSSiteSettings objects, 389
attributes of, 391
creating, 394
ntdsutil utility
authoritative restore of object or subtree, 586
checking integrity of DIT file, 589
creating AD snapshot, 579
creating and deleting application partition,
609
finding and deleting duplicate SIDs in a do‐
main, 51
finding replica servers for application parti‐
tion, 614
forcibly seizing Schema FSMO to another
domain controller, 386
inability to recover database with, 594
modifying default LDAP query policy, 157
modifying default TTL settings for dynamic
objects, 144
mounting AD snapshot, 580
moving DIT files, 590
offline defrag of DIT to reclaim space, 597
promoting server to Windows Server 2012
from media, 64
removing metadata of removed domain, 21
removing unsuccessfully demoted domain
controller, 71
repairing or recovering the DIT, 591
resetting DSRM administrator password,
584
restoring deleted domain controller in Win‐
dows Server 2012, 81
transferring a FSMO role, 98
transferring Schema FSMO role, 386
verifying state of an application partition,
617
null value, flowing to data source in FIM, 780
O
Object Identifiers (OIDs), generating for new
class or attribute, 350
objectCategory attribute, 553
objectClass attribute, 133
dynamicObject, 141
objectClassCategory attribute, classSchema ob‐
jects, 376
objectGUID attribute, 117
objects, 103–163
AD LDS, viewing and modifying attributes,
645
anatomy of, 103
authoritative restore of, 586
changing ACL for, 518
common attributes, 103
comparing ACL to default defined in sche‐
ma, 520
connecting to object’s GUID, 116
connecting to well-known GUID, 117
Index | 817
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
843
|
counting in Active Directory, 110
creating, 131
creating dynamic object, 140
deleted objects in AD, 576
deleting, 153
deleting container with child objects, 155
deleting in an OU, 172
dynamically linking an auxiliary class, 139
enumerating in an OU, 170
exporting to CSV file, 161
exporting to LDIF file, 159
extending object types to include new at‐
tribute in FIM, 773
importing using LDIF file, 160
importing using PowerShell and CSV file,
162
modifying, 134
modifying a bit flag attribute, 136–138
modifying default LDAP query policy, 157
modifying default TTL settings for dynamic
objects, 144
moving between OUs, 175
moving to different domain, 147
moving to different OU or container, 145
referencing an external domain, 149
refreshing a dynamic object, 142
renaming, 150
resetting ACL to default defined in schema,
521
searching for large number of, 124
searching for, in a domain, 120
searching the global catalog, 122
searching with attribute-scoped query, 126
searching with bitwise filter, 128
segregating into OUs, 167
undeleting a single object, 603
using fast or concurrent bind, 114
using LDAP controls, 112–114
viewing ACL for an object, 513
viewing attributes of, 106–110
viewing created and last-modified time‐
stamps, 156
viewing effective permissions on, 515
viewing metadata for, 456
viewing the RootDSE object, 104
viewing user’s managed objects, 242
objectVersion attribute of AD DS forest, 33
offline defrag, performing on DIT, 597
OIDs (Object Identifiers), generating for new
class or attribute, 350
oldcmp utility, 239
finding inactive or unused computers, 289
oMSyntax attribute, 356
one-way trusts, 15
online defrag, performing manually, 592
operating system (OS)
computer object attributes for, 274
operating systems (OS)
finding computers with particular OS, 294
options attribute, 138
organizational units (see OUs)
organizationalUnit objects, 165
orphaned objects, finding, 453
OUs (organizational units), 165–187
assigning or removing manager for, 183
attributes of organizationalUnit objects, 165
blocking inheritance of GPOs on an OU, 325
creating, 166
creating GPO link to an OU, 324
delegating control of, 182
deleting an OU, 173
deleting objects in, 172
determining number of child objects, 181
Domain Controllers organizational unit, 56
enumerating in a domain, 168
enumerating objects in, 170
finding, 169
group objects in, 255
linking GPO to, 185
managing AD LDS OUs, 637
modifying, 179
moving an OU, 177
moving object to different OU or container,
145
moving objects to different OU, 175
moving users between, 203
protecting against accidental deletion, 186
protection against accidental deletion of a
group, 270
redirecting users to alternative OU, 205
renaming, 178
restoring an OU and all its child objects, 605
Outlook Web App (OWA), 673
P
PAC (Privilege Attribute Certificate), 530
paged searching support via LDAP controls, 125
818 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
844
|
partitions, 607
(see also application partitions)
in a forest, 13
in AD LDS instances, 635
predefined partitions hosted by AD domain
controllers, 607
Partitions container, 14, 608
crossRef objects, 150
msDS-Behavior-Version attribute, 29
Password Replication Policy (PRP)
configuration for RODCs, 57
modifying on a RODC, 62
passwords
applying fine-grained password policy to
group object, 270
applying fine-grained password policy to
user object, 216
changing for AD LDS user, 640
finding users with passwords nearing expira‐
tion, 231
password management in FIM, 720
preventing from expiring, 230
preventing user from changing, 228
requiring user to change password at next
logon, 229
resetting DSRM administrator password,
584
RODCs that cached computer’s password,
viewing, 303
setting user’s password, 226
viewing domain-wide password policies,
213–215
viewing fine-grained password policy for
user account, 217
PasswordSettingsObjects (PSOs), 217, 271
creating for fine-grained password policies,
343
editing, 344
precedence rules for, 218, 346
viewing effective PSO for a user, 345
PDC Emulator, 97
finding holders of role, 96
finding role owner via DNS, 100
finding via DNS, 93
seizing the role, 99
setting time source on, 84
transferring role to another domain control‐
ler, 98
performance alerts, 559
emailing an administrator on, 560
Performance Monitor
creating administrative alert, 559
emailing administrator on performance
alert, 560
examining performance of Active Directory,
554
using Trace Logs to monitor Active Directo‐
ry, 557–558
viewing DNS server performance statistics,
546
PermissionBits, description of values, 653
permissions, 310
(see also GPOs; security; users)
viewing for a group, 251
PowerShell, 2, 2
accessing snapshot data, 581
Active Directory versions and, 3
adding and removing group members, 255
adding attribute to RO-FAS, 381
adding computer account to a group, 285
adding new class to the schema, 361
adding or removing replica server for appli‐
cation partition, 613
adding user or group to DHCP Administra‐
tors group, 499
anti-malware scanning on Exchange Server,
script for, 704
applying fine-grained password policy to
group object, 271
applying fine-grained password policy to
user object, 216
applying security filter to a GPO, 328
assigning or removing manager for an OU,
184
authoritative restore of object or subtree, 587
authorizing a DHCP server, 495
backing up a GPO, 336
backing up the AD database, 578
binding to default container for computers,
297
blocking inheritance of GPOs on an OU, 326
changing ACL of an object, 518
changing inter-site replication interval, 447
changing interval at which KCC runs, 436
changing intra-site replication notification
interval, 446
changing machine account quota, 291
Index | 819
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
845
|
changing password for AD LDS user, 641
changing scope or type of a group, 260
changing subnet’s site assignment, 407
changing tombstone quota factor, 569
checking for replication problems, 449
checking if global catalog (GC) promotion is
complete, 90
clearing DNS cache, 483
configuring alternate UPN suffix, 667
configuring central access rule, 533
configuring conditional forwarding, 473
configuring forwarding, 472
configuring LDAP attribute store, 662
configuring logging for AD FS, 671
configuring mailbox limits, 698
configuring Microsoft SQL Server attribute
store, 663
configuring permission inheritance, 517
configuring universal group caching for a
site, 400
configuring zone transfers, 470
connecting to object GUID, 117
connecting to well-known GUIDs, 119
converting user object to inetOrgPerson ob‐
ject, 199
converting zone to AD integrated zone, 468
copying a GPO, 310
copying a user, 208
copying user’s group membership to another
user, 226
counting objects in Active Directory, 111
creating a computer account, 275
creating a domain, 20
creating a forest, 17
creating a GPO, 309
creating a site, 394
creating a site link, 408
creating a site link bridge, 417
creating a subnet, 402
creating a user, 193
New-ADUser cmdlet, switches for, 194
creating AD FS claim descriptions, 663
creating address list in Exchange Server, 700
creating an object, 133
creating an OU, 167
creating and deleting DNS resource records,
477
creating central access policy, 534
creating claim type, 531
creating Claims Provider Trust rules, 670
creating fine-grained password policy
(FGPP), 343
creating forward lookup zone, 464
creating groups, 250
creating large number of users, 195
creating mailbox database, 703
creating or removing AD LDS groups, 643
creating or removing AD LDS OUs, 638
creating replying party trust, 665
creating reverse lookup zone, 465
creating schema attribute, 355
creating UPN suffix for a forest, 243
deactivating schema class or attribute, 382
delegating control for managing group
membership, 264
delegating control of AD integrated zone,
475
deleting a computer, 278
deleting a GPO, 312
deleting a site, 397
deleting a subnet, 406
deleting a user, 201
deleting an object, 154
deleting an OU, 174
deleting container with child objects, 155
deleting objects in an OU, 173
demoting domain controllers, 21
demoting Windows Server 2012 domain
controller, 67
determining amount of whitespace in DIT,
596
determining and enabling universal group
membership caching, 267
determining if domain controllers are in
sync, 440
determining if KCC completes successfully,
433
determining number of child objects for an
OU, 182
disabling automatic site coverage for domain
controller, 425
disabling inter-site compression of replica‐
tion traffic, 448
disabling KCC for a site, 435
disabling site link transitivity and site link
schedules, 415
disabling user or computer settings in a
GPO, 322
820 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
846
|
dynamically linking auxiliary class to exist‐
ing object instance, 140
editing a fine-grained password policy, 344
emailing administrator on performance
alert, 560
enabling and disabling global catalog (GC),
88
enabling anonymous LDAP access, 506
enabling change notification for site link,
413
enabling diagnostic logging, 541
enabling DNS server debug logging, 486
enabling GPO client logging, 543
enabling Kerberos logging, 545
enabling message tracking on Exchange
Server, 705
enabling or disabling AD LDS user, 642
enabling or disabling user account, 219
enforcing settings of GPO link, 327
enumerating objects in an OU, 171
enumerating OUs in a domain, 169
enumerating trusts for a domain, 42
Exchange Server 2013, working with, 674
exporting objects to CSV file, 161
finding an OU, 170
finding application partitions hosted by a
server, 616
finding application partitions in a forest, 610
finding bridgehead servers for sites, 418
finding classes of different types, 376
finding closest domain controller, 75
finding computers with particular OS, 295
finding conflict objects, 452
finding disabled users, 220
finding domain controllers for a domain, 74
finding domain controllers or global catalog
servers in a site, 91
finding domain controller’s site, 76
finding domains in a forest, 24
finding Exchange Server cmdlets, 676
finding FSMO role holders in forest or do‐
main, 97
finding global catalogs in domain or forest,
90
finding GPOs in a domain, 308
finding holders of FSMO roles, 96
finding inactive or unused computers, 290
finding linked attributes, 374
finding locked-out users, 209
finding mandatory and optional attributes of
a class, 377
finding NetBIOS name of a domain, 25
finding nonreplicated and constructed at‐
tributes, 372
finding orphaned objects, 454
finding quotas in a domain, 567
finding site links for a site, 409
finding users who haven’t logged on recently,
239
finding users with passwords nearing expira‐
tion, 231
forcing host into a particular site, 427
forcing Kerberos to use TCP, 528
forcing replication from one domain con‐
troller to another, 443
importing objects using CSV file, 162
importing settings into a GPO, 315
indexing an attribute, setting searchFlags bit
value, 364
installing AD FS Federation Service, 661
installing AD LDS, 626
joining a computer to a domain, 279
linking GPO to an OU, 185
listing 5807 events, 405
listing AD LDS instances installed on a com‐
puter, 634
listing all computer accounts in a domain,
300
listing connection objects for a server, 429
listing links for a GPO, 324
listing replication partners for domain con‐
troller, 456
listing servers in site topology, 421
listing sites in a domain, 395
listing subnets and displaying their proper‐
ties, 403
logging number of expired tombstone ob‐
jects, 600
mail-disabling a user, 688
mail-enabling a user, 688
mailbox-disabling a user, 692
mailbox-enabling a user, 690
managing AD LDS group memberships, 645
managing AD LDS replication authentica‐
tion, 651
managing AD LDS users, 640
managing confidentiality bit for schema at‐
tributes, 380
Index | 821
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
847
|
migrating a group, 258
modifying a bit flag attribute, 137
modifying an object, 135
modifying an OU, 180
modifying attribute for several users at once,
200
modifying attributes copied during user du‐
plication, 366
modifying attributes included with ANR,
367
modifying computer object’s attributes, 293
modifying cost for a site link, 412
modifying default display name for users
created in ADUC or ADAC, 192
modifying default security of a class, 379
modifying DNS server configuration, 480
modifying GPO settings, 314
modifying group attributes, 262
modifying list of allowed DNS suffixes for
domain, 494
modifying replication schedules, 414
modifying sites associated with a site link,
410
modifying tombstone lifetime for a domain,
606
moving a group within a domain, 256
moving a mailbox, 693
moving AD integrated zones into applica‐
tion partition, 469
moving an OU, 178
moving computer within same domain, 281
moving domain controller to different site,
78, 423
moving object to different domain, 148
moving object to different OU or container,
146
moving objects to different OU, 176
moving Schema FSMO to another domain
controller, 387
moving users, 204
parameters, replaceable text in, 6
performance monitoring for Active Directo‐
ry, 555
performing online defrag, 593
preventing domain controller from dynami‐
cally registering certain resource records,
492
preventing user from changing a password,
229
preventing user’s password from expiring,
230
promoting a server as RODC, 60
promotion or demotion of domain control‐
lers, automating, 67
protecting an OU against accidental dele‐
tion, 186
protecting computer against accidental dele‐
tion, 303
protecting group against accidental deletion,
270
protecting user against accidental deletion,
245
querying DNS resource records, 479
raising domain functional level to Windows
Server 2012, 27
refreshing a dynamic object, 143
refreshing GPO settings on a computer, 341
remotely installing domain controller, 68
removing all group memberships from user,
223
renaming a computer, 284
renaming a site, 396
renaming an object, 152
renaming an OU, 179
renaming user objects, 207
requiring user to change password at next
logon, 230
resetting computer’s secure channel, 288
resolving primary group for a user, 265
restoring a deleted group, 269
restoring a GPO, 337
restoring all child objects of OU, 605
restoring deleted domain controller in Win‐
dows Server 2012, 81
retrieving current forest functional level, 29
reviewing GPO settings, 313
running Exchange Server 2013 setup.exe,
682
scavenging old DNS resource records, 481
scripts in Exchange scripts folder, 675
searching for deleted objects, 602
searching for large number of objects, 125
searching for objects in a domain, 121
searching the global catalog, 123
searching with attribute-scoped query, 127
searching with bitwise filter, 129
seizing a FSMO role, 100
822 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
848
|
setting default quota for security principals,
570
setting preferred bridgehead server for a site,
420
setting replication notification delay for ap‐
plication partition, 619
setting user account options (userAccount‐
Control), 234
setting user’s account to expire, 237
setting user’s password, 227
setting user’s profile attributes, 203
SID filtering settings, viewing, 47
starting and stopping AD LDS instance, 632
Stop-Service cmdlet, 576
stopping and starting Exchange Server, 685
synchronizing DSRM password with pass‐
word of domain Administrator account,
584
testing secure channel for a computer, 286
transferring a FSMO role, 98
transferring ISTG to another site, 431
triggering the KCC, 433
undeleting a single object, 604
unlocking a user, 211
using LDAP controls, 113
verifying that domain controller can register
its resource records, 484
viewing ACL for an object, 513
viewing an attribute, 358
viewing and modifying AD LDS object at‐
tributes, 647
viewing and modifying user’s permitted log‐
on hours, 240
viewing class properties, 362
viewing created and last-modified time‐
stamps of an object, 156
viewing direct members of a group, 253
viewing DNS server performance statistics,
547
viewing domain-wide account lockout and
password policies, 213
viewing fine-grained password policy for
user object, 217
viewing mailbox sizes and message counts,
696
viewing nested group membership, 254
viewing object metadata, 456
viewing object’s attributes, 107
viewing permissions of a group, 251
viewing replication status for domain con‐
trollers, 441
viewing RODCs that cached computer’s
password, 304
viewing RODCs that cached user’s password,
233
viewing RootDSE object, 105
viewing server’s zones, 466
viewing user’s group membership, 221
viewing user’s managed objects, 242
Preview function, using in FIM, 774
primaryGroupID attribute, user objects, 224,
265
primaryGroupToken attribute, group object,
224, 265
Privilege Attribute Certificate (PAC), 530
profile attributes, setting for users, 202
profilePath attribute, 203
projection (in FIM), 712
provisioning and, 744
setting up SQL Server MA to project objects
to metaverse, 743
provision (in FIM), 744
provisioning (in FIM)
creating run profile for, 747
executing provisioning rule, 749
projection and, 744
steps in process, 745
PRP (see Password Replication Policy)
psomgr utility, 217
applying fine-grained password policy to
group object, 271
editing fine-grained password policy, 344
viewing effective PSO for a user, 345
PSOs (see PasswordSettingsObjects)
Public Key Infrastructure (PKI), 707
pwdLastSet attribute, 232
pwdProperties attribute, 215
Q
quarantine, enabling for a trust, 48
query policy settings (LDAP), 158
querybackuplocation.wsf script, 336
queryPolicy objects, 158
quotas
anatomy of a quota object, 540
anatomy of quota object container, 540
changing relative weight of tombstone ob‐
jects in calculations, 568
Index | 823
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
849
|
creating, 565
defined, 539
finding quota usage for security principals,
571–573
finding quotas assigned to security principal,
567
setting default for all security principals, 570
R
RDN (relative distinguished name), 14
changing for renamed user, 207
specifying value when creating objects, 133
Read-Only Domain Controllers (see RODCs)
Read-Only Filtered Attribute Set (RO-FAS)
adding attribute to, 381
recovery
nonauthoritative restore, 585
performing authoritative restore of object or
subtree, 586
performing complete authoritative restore,
588
performing database recovery, 593
recovering the DIT, 591
restarting domain controller in DSRM, 582–
584
snapshots of AD database, 578
undeleting a container object, 604
undeleting a single object, 603
Recycle Bin feature (AD), 80
redircmp utility, 297
changing default container for computers,
299
redirusr command, 206
Reference DN, 732
regedit utility
changing interval at which KCC runs, 436
determining amount of whitespace in DIT,
596
enabling diagnostic logging, 541
enabling GPO client logging, 543
enabling Kerberos logging, 545
enabling strict or loose replication consisten‐
cy, 450
forcing host into a particular site, 427
forcing Kerberos to use TCP, 527
logging number of expired tombstone ob‐
jects, 600
RegisterInDNS test (dcdiag), 69
Registry settings
configuring domain controller to use exter‐
nal time source, 83
diagnostics logging, 540
disabling automatic site coverage for domain
controller, 425
enabling auditing of changes to Registry
keys, 564
enabling Group Policy logging, 544
enabling Kerberos logging, 545
forcing host into a particular site, 427
governing ISTG registration, 432
interval at which KCC runs, 437
mnemonics for resource records, 492
modifying Priority or Weight field in SRV
resource records, 93
preventing domain controller from dynami‐
cally registering certain resource records,
491
viewing RSoP for a computer, 340
relative distinguished name (see RDN)
relying party trust, creating, 664
Remote Server Administration Tools (RSAT),
215
Remove Roles and Features Wizard, 21
Remove-ADReplicationSite cmdlet, 397
Remove-ADReplicationSubnet cmdlet, 406
Remove-GPO cmdlet, 312
rendom.exe utility, 26
repadmin utility
checking for replication problems, 449
creating a connection object, 428
enabling and disabling replication, 444
enabling strict or loose replication consisten‐
cy, 451
finding bridgehead servers for a site, 418
finding ISTG for a site, 430
forcing AD LDS replication, 650
forcing replication from one domain con‐
troller to another, 443
listing connection objects for a server, 429
setting replication notification delay for ap‐
plication partition, 619
triggering the KCC, 432
viewing replication status for domain con‐
trollers, 440
viewing unreplicated changes between do‐
main controllers, 442
replaceable text in examples, 6
824 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
850
|
Replicating Directory Changes rights, 712
replication, 439–459
AD LDS configuration set, 629
changing inter-site replication interval, 446
changing intra-site replication notification
interval, 445
checking for potential problems, 449
controlling manually, 415
determining if two domain controllers are in
sync, 439
disabling inter-site compression of replica‐
tion traffic, 448
enabling and disabling, 444
enabling strict or loose consistency, 450
enhanced logging of replication events, 450
finding conflict objects, 452
finding orphaned objects, 453
forcing AD LDS replication, 649
forcing from one domain controller to an‐
other, 442
intra-site, configuring for AD LDS applica‐
tion partition, 648
listing replication partners for a domain
controller, 455
managing AD LDS replication authentica‐
tion, 650
modifying schedules for, 413
setting notification delay for application par‐
tition, 618
viewing object metadata, 456
viewing replication status of several domain
controllers, 440
viewing unreplicated changes between do‐
main controllers, 441
Replication Monitor
finding bridgehead servers for a site, 418
request.inf file, 659
reserve file, creating, 595
resource properties for Dynamic Access Con‐
trol, 532
resource records, DNS, 461
creating and deleting, 475
deregistering domain controller’s records,
488
preventing domain controller from dynami‐
cally registering all records, 489
preventing domain controller from dynami‐
cally registering certain records, 490
querying, 478
registering domain controller’s records, 488
Registry mnemonics for, 492
scavenging old records, 480
verifying that domain controller can register
its records, 484
resources for information, 7
restore from replication, 585
Restore-GPO cmdlet, 337
restoregpo.wsf script, 337
restores (see recovery)
Resultant Set of Policies (see RSOP)
reverse lookup zones, 464
revision attribute of AD DS domain, 33
Richards, Joe, 3
RID FSMO role, 97
finding holders of role, 96
moving a group to another domain, 258
seizing, issues with, 100
transferring to another domain controller,
98
RIDs, 51
RO-FAS (Read-Only Filtered Attribute Set)
adding attribute to, 381
RODCs (Read-Only Domain Controllers), 56
AdPrep switch to allow for installation of, 31
attributes of, 57
installation, two-stage, 61
modifying Password Replication Policy
(PRP), 62
preventing attribute’s replication to, 381
promoting a server to RODC, 59
viewing RODCs that cached computer’s
password, 303
viewing RODCs that cached user’s password,
232
root domain, creating for a forest, 17
RootDSE objects
domainFunctionality attribute, 28
forestFunctionality attribute, 29
isGlobalCatalogReady attribute, 89
schemaUpdateNow attribute, 385
viewing attributes of, 104
RSAT (Remote Server Administration Tools),
215
RSoP (Resultant Set of Policies)
simulating, 338
viewing, 339
Index | 825
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
851
|
run profiles, 717
configuring to do initial load of data from
SQL Server MA, 737
configuring to load container structure from
AD, 740
configuring to load telephoneNumber from
AD, 762
creating for provisioning, 747
creating script for, 753
creating to export object from AD MA to
AD, 750
exporting objects to AD using, 752
SQL Server MA export run profile, using to
export data to SQL Server DB, 768
using to load initial SQL Server DB data into
FIM 2010 R2, 739
Run Step Warning dialog box, 765
runas command, 4
S
SACL (System Access Control List), 252
SAM account, retrieving for all user objects in a
domain, 120
sAMAccountName attribute
changing when renaming users, 207
computer objects, 275
not applicable to AD LDS users, 640
using in group creation, 249
schema, 347–387
adding a new attribute, 354–357
adding a new class, 360
adding attribute to Read-Only Filtered At‐
tribute Set (RO-FAS), 381
anatomy of schema objects, 347
changing default ACL for object class, 519
deactivating classes and attributes, 382
default ACL for object class, comparing ACL
of object to, 520
documenting extensions, 353
extending, 351
extending AD LDS schema, 634
finding linked attributes, 373
finding nonreplicated and constructed at‐
tributes, 371
finding structural, auxiliary, abstract and 88
classes, 375
generating OID to use for new class or at‐
tribute, 350
indexing an attribute, 363
managing confidentiality of attributes, 379
managing Schema Master FSMO, 386
modifying attributes copied when duplicat‐
ing a user, 365
modifying attributes included in ANR, 367–
369
modifying default security of a class, 378
modifying set of attributes stored on global
catalog, 369
preparing Active Directory for Exchange
Server, 678
preparing for Active Directory upgrade, 352
redefining classes and attributes, 383
registering Active Directory Schema MMC
snap-in, 349
reloading the cache, 384
viewing a class, 362
viewing an attribute, 358
schema cache, 385
Schema container, 348
Schema FSMO role, 97
extending schema on, 385
finding holders of, 95
managing, 386
running AdPrep on to prepare forest for
Windows Server 2012, 30
Schema NC, 14, 607
replication to domain controllers, 55
schemaIDGUID attribute
attributeSchema object, 349
classSchema object, 348, 361
scope
changing for a group, 259
group scopes, 248
LDAP searches, 121
scope of management (SOM), 305
assigning while linking a GPO, 325
scriptPath attribute, 203
scripts
assigning in a GPO, 320
creating controlling script for FIM, 755–760
creating run profile script, 754
Group Policy Management Console Sample
Scripts, 307
scripts folder, Exchange Server 2013, 675
Search Connector Space dialog box, 770
searchFlags attribute, 357
attributeSchema object, 130
confidentiality bit, 380
826 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
852
|
setting value to index an attribute, 363
secure channel for a computer, 273
resetting, 288
testing, 286
Secure Sockets Layer (see SSL)
security, 501–537
applying central access policy, 535
auditing of directory access and modifica‐
tions, 561–564
auditing of Registry keys, 564
authentication (see authentication)
changing ACL of an object, 518
comparing ACL of object to default defined
in schema, 520
configuring central access rule, 533
configuring permission inheritance, 516
creating central access policy, 534
creating claim type for Dynamic Access
Control, 531
creating resource property for Dynamic Ac‐
cess Control, 532
customizing ACL Editor, 514
customizing Delegation of Control Wizard,
509–511
disabling LDAP signing, 504
enabling anonymous LDAP access, 505
enabling List Object Access mode, 523
enabling SSL/TLS, 502
managing AD LDS permissions, 652
modifying ACL on administrator accounts,
525
modifying default security of a class, 378
resetting object’s ACL to default defined in
schema, 521
revoking delegated permissions, 512
securing LDAP traffic with SSL, TLS, or
signing, 503
using Delegation of Control Wizard, 507
viewing ACL for an object, 513
viewing effective permissions on an object,
515
vulnerability with use of SID history, 47
security boundary for Active Directory, forests
as, 12
security filters, applying to GPO, 327
Security Identifiers (see SIDs)
security principals
finding quota usage for, 571–573
finding quotas assigned to, 567
protected by AdminSDHolder process, 518
quotas on number of objects created by, 565
setting default quota for all, 570
security templates, importing into GPOs, 331
Selective Authentication for a trust, 49
Send-MailMessage cmdlet, 560
Server Manager
demoting Windows Server 2012 domain
controller, 66
enabling SSL/TLS, 502
installing AD FS Federation Service, 661
installing AD LDS on Windows Server 2012
server, 626
installing IIS, 658
server objects, 57, 390
attributes of, 392
distinguished name (DN), 87
listing in site topology, 421
representing domain controllers in site top‐
ology, 76
serverless binding, 4
servers
application partitions hosted by, finding, 615
DHCP, authorizing, 495–497
DNS
enabling debug logging, 485
flushing the cache, 483
modifying configuration, 479
performance statistics, 546
viewing server’s zones, 466
zone transfers, 471
installing first Exchange Server 2013 server,
679
replica server for application partition
adding or removing, 611
finding, 613
Servers container, 389
serversContainer objects, creating, 394
service-pack-level attributes of computer ob‐
jects, 52
servicePrincipalName attribute, 494
services (Exchange Server), 685
Services MMC snap-in
starting and stopping AD LDS instance, 632
stopping and starting Exchange Server, 685
Set-ADAccountControl cmdlet, 229
Set-ADAccountPassword cmdlet, 227
Set-ADComputer cmdlet
modifying computer object’s attributes, 293
Index | 827
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
853
|
Set-ADDomainMode cmdlet, 27
Set-ADGroup cmdlet
modifying group attributes, 262
switches to modify specific group attributes,
262
Set-ADObject cmdlet, 88
Set-ADReplicationSiteLink cmdlet, 447
Set-ADReplicationSubnet cmdlet, 407
Set-ADUser cmdlet
switches to modify userAccountControl, 234
Set-GPInheritance cmdlet, 326
Set-GPLink cmdlet, 327
Set-GPPermission cmdlet, 329
Set-GPRegistryValue cmdlet, 314
setgpopermissions.wsf script, 328, 328
Setup.exe (Exchange Server), 677
shortcut trust, creating between AD domains,
38
SIDs (Security Identifiers)
enabling SID filtering for a trust, 47
finding duplicate SIDs in a domain, 51
restricting with quarantined trust, 48
signing
disabling LDAP signing, 504
securing LDAP traffic with, 503
single sign-on (SSO), 657
site objects, 57
objects contained in, 394
site topology, 389–437
anatomy of objects, 390–393
changing interval at which KCC runs, 436
changing subnet’s site assignment, 406
configuring domain controller to cover mul‐
tiple sites, 423
configuring universal group caching for a
site, 399
creating a connection object, 428
creating a site, 393
creating a site link, 407
creating a site link bridge, 416
creating a subnet, 401
delegating control of a site, 398
deleting a site, 397
deleting a subnet, 405
determining if KCC is completing success‐
fully, 433
disabling automatic site coverage for a do‐
main controller, 425
disabling KCC for a site, 434
disabling site link transitivity or site link
schedules, 415
enabling change notification for a site link,
412
finding bridgehead servers for a site, 418
finding ISTG for, 429
finding missing subnets, 403
finding site for a client, 426
finding site links for a site, 409
forcing host into a particular site, 427
hierarchy, 390
listing connection objects for a server, 429
listing servers, 421
listing sites in a domain, 395
listing subnets, 402
modifying cost for a site link, 411
modifying replication schedules, 413
modifying sites associated with a site link,
410
moving domain controller to a different site,
422
renaming a site, 396
setting preferred bridgehead server for a site,
419
transferring ISTG to another site, 431
triggering the KCC, 432
viewing site coverage for a domain control‐
ler, 424
siteLink objects, 57
attributes of, 391
creating, 407
disabling transitivity or schedules, 415
enabling change notification for, 412
finding for a site, 409
modifying cost for, 411
modifying replication schedules, 413
modifying sites associated with, 410
sites, 76
(see also site topology)
finding domain controllers or global catalogs
in, 91
finding domain controller’s site, 76
moving domain controller to different site,
77
Sites container, 57, 389
sn (last name) attribute, 207
snapshots of AD database, 578
accessing snapshot data, 581
creating, 579
828 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
854
|
mounting, 580
SOM (scope of management), 305, 305
assigning while linking a GPO, 325
SQL (Structured Query Language) and Fore‐
front Identity Manager collocation, 709
SQL Server
configuring attribute store for AD FS, 662
creating SQL Server management agent, 722
exporting telephoneNumber data from SQL
Server MA to SQL Server DB, 767
Forefront Identity Manager (FIM), 707
SRV resource records
global catalog servers and domain control‐
lers, 92
modifying Priority or Weight field, 93
SSL (Secure Sockets Layer), 501
enabling, 502
installing certificate on IIS server, 658
LDAP over SSL, changing ports used by AD
LDS instance, 633
securing LDAP traffic with, 503
SSO (single sign-on), 657
staging in FIM, 710
state-based synchronization (FIM), 714
STATS LDAP control, using to view query sta‐
tistics, 551–554
Stop-Service cmdlet, 576
strict replication consistency, 450
structural classes, finding, 375
subnet objects, 57
attributes of, 391
deleting, 405
subnets
changing site assignment, 406
creating, 401
finding missing subnets, 403
listing in AD, 402
Subnets container, 402
subSchema objects, 348
subtrees, authoritative restore of, 586
Support Tools, Replication Monitor, 418
synchronization of identity data, 715
objects projected from SQL Server MA to
metaverse, 744
Synchronization Service Manager
committing changes using Commit Preview,
777
configuring run profile for SQL Server MA,
738
configuring run profile to load telephone‐
Number from AD, 763
configuring SQL Server MA export run pro‐
file to export data to SQL Server DB, 767
creating Active Directory management
Agent, 724
creating metaverse Provisioning-RulesExtension, 745
creating provisioning run profile for SQL
Server MA, 747
creating run profile script, 754
creating SQL Server management agent, 723
defining advanced import attribute flow, 731
deleting data in connector space and meta‐
verse, 772
enabling directory synchronization from AD
to HR database, 761
exporting and encoding accountExpires at‐
tribute, 784
flowing null value to a data source, 780
implementing advanced attribute flow rules
extension, 733
importing and exporting accountExpires at‐
tribute, 782
loading initial SQL Server DB data into FIM
using run profile, 739
run profile to export objects from AD MA to
AD, 750
running AD MA run profile to import con‐
tainer structure, 742
running Delta Import and Delta Synchroni‐
zation run profile, 765
searching data in connector space, 769
searching data in metaverse, 771
setting up advanced export attribute flow in
Active Directory, 736
setting up metaverse object deletion rule,
727
setting up simple attribute flow to AD, 729
setting up simple import attribute flow, 728
System Access Control List (SACL), 252
System Center Configuration Manager (Con‐
figMgr), 322
System container
trustedDomain objects in, 15
WMIPolicy container, 332
System State backup of AD database, 578
Index | 829
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
855
|
systemFlags attribute
attributeSchema object, 130, 373
bit values, 359
classSchema object, 348
crossref object, 611
systemMayContain attribute, classSchema ob‐
ject, 378
systemMustContain attribute, classSchema ob‐
ject, 378
SYSVOL folder, 306
replication of, 64
T
TCP, forcing Kerberos to use, 527
TCP/IP stack, resetting on domain controller,
82
telephoneNumber attribute
configuring run profile to load from AD, 762
exporting data to SQL Server database, 767
loading changes from AD using run profile,
765
templates
for GPO settings, 318
security template, importing into a GPO, 331
TGT (ticket-granting ticket), 527, 530
third-party tools
for Exchange Server 2013, 675
ticket-granting ticket (TGT), 527, 530
Time Service (Windows), monitoring, 548
time source (external), configuring domain
controller to use, 83
timestamps, created and last-modified, of an
object, 156
TLS (Transport Layer Security), 501
enabling, 502
securing LDAP traffic with, 503
tokensz utility, 530
tombstone objects, 576
changing how they count against quota us‐
age, 568
created by a security principal, 572
expired, logging number of, 600
garbage collection of expired objects, 599
modifying tombstone lifetime for a domain,
605
tombStoneLifetime attribute, 451
tombstoneLifetime attribute, 577
Trace Logs (Perfmon), 557–558
transaction properties in FIM, 778
transitive trusts, 15
Transport Layer Security (see TLS)
Tree Delete LDAP control, 174
trustedDomain objects, 15
trusts
anatomy of, 15
configuring a claims provider trust, 665
creating a replying party trust, 664
creating an external trust, 35
creating shortcut trust between two AD do‐
mains, 38
creating transitive trust between two AD for‐
ests, 37
creating trust to Kerberos realm, 40
defined, 11
enabling quarantine for, 48
enabling SID filtering for, 47
managing selective authentication for, 49
removing, 45
resetting, 45
restoration of trust objects, 587
transitive trust relationship between all do‐
mains in a forest, 13
verifying, 43
TTL settings (default), modifying for dynamic
objects, 144
U
unattended installation of Exchange Server, 682
unicodePwd attribute, 133, 227
Uninstall-ADDSDomainController cmdlet, 21,
67, 68
universal groups, 248
configuring caching for a site, 399
enabling group membership caching, 266
moving to another domain, 258
unjoining a computer from a domain, 280
unlock command, 209
unlocking a user, 210
up-to-dateness vector for domain controllers,
439
UPN (User Principal Name), 207
configuring alternate UPN suffix, 666
creating UPN suffix for a forest, 243
extracting to create a claim rule, 668
modifying, 207
UPN (userPrincipalName)
computer objects, 277
urgent replication, 446
830 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
856
|
user objects, 15
accountExpires attribute, 237
attributes changed when creating a mailbox
for, 691
attributes of, 189
converting to or from inetOrgPerson ob‐
jects, 198
creating, 192
linked attributes, 375
logonHours attribute, 241
provisioning in AD MA from objects in SQL
Server MA, 744–747
retrieving SAM account name for all in a do‐
main, 120
userAccountControl attribute, 130, 234
User Principal Name (see UPN)
userAccountControl attribute, 130, 138, 219
disabled user accounts, 220
disabling expiration of user’s password, 231
properties defined in
ADS_USER_FLAG_ENUM, 235
setting user’s account options, 233
userAccountControl flag, 737
USERDOMAIN environment variable, 25
userProxy objects, 645
users, 189–245
adding additional fields to AD Users and
Computers, 52
anatomy of, 189
applying fine-grained password policy to
user object, 216
changing password for AD LDS user, 640
changing primary group for, 223
converting user object to or from inetOrg‐
Person object, 198
copying, 208
copying user’s group membership to another
user, 225
creating, 192
creating a computer for specific user, 276
creating inetOrgPerson user, 196
creating large number of, 194
creating UPN suffix for a forest, 243
deleting, 201
determining last logon time, 237
disabling user settings in a GPO, 322
duplication of, modifying attributes copied
during, 365
enabling and disabling, 218
enabling and disabling AD LDS user, 641
finding disabled users, 219
finding locked-out users, 209
finding passwords nearing expiration, 231
finding users who haven’t logged on recently,
238
mail-disabling, 688
mail-enabling, 687
mailbox-disabling (deleting the mailbox),
691
mailbox-enabling, 689
managing AD LDS users, 639
modifying attribute for several users at once,
200
modifying default display name for users
created in ADUC or ADAC, 191
moving, 203
moving mailbox for, 693
preventing from changing a password, 228
preventing password from expiring, 230
protecting against accidental deletion, 245
redirecting to alternative OU, 205
removing all group memberships from, 222
renaming, 206
requiring password change at next logon,
229
resolving primary group ID for, 264
restoration of, issues with, 587
restoring deleted user, 244
setting account options (userAccountCon‐
trol), 233
setting account to expire, 236
setting password for, 226
setting profile attributes, 202
troubleshooting account lockout problems,
211
unlocking, 210
viewing and modifying permitted logon
hours for, 240
viewing domain-wide account lockout and
password policies, 213–215
viewing effective POS for, 345
viewing fine-grained password policy for
user account, 217
viewing group membership for, 221
viewing RODCs that cached user’s password,
232
viewing user’s managed objects, 242
Users container of a domain, 15
Index | 831
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
857
|
V
VBScript
enabling List Object Access mode, 523
forcing Kerberos to use TCP, 528
modifying a bit flag attribute, 136
VisualBasic, script for advanced attribute flow
rules extension, 734
Volume Shadow Copy Service (VSS), 579
W
W32time service, stopping and starting, 84
w32tm utility, 548
wbadmin utility
backing up the AD database, 578
nonauthoritative restore of domain control‐
ler, 585
performing complete authoritative restore,
588
Web SSO design, 657
websites, information resources for Active Di‐
rectory, 8
well-known GUIDs (WKGUIDs)
connecting to, 117
mapped to container objects, 297
wellKnownObjects attribute, 119
domainDNS object, 298
whitespace
determining amount in DIT, 596
generated in ntdis.dit from deleted objects,
593
whoami utility, 221
Windows Management Instrumentation (see
WMI)
Windows operating systems, monitoring per‐
formance of, 559
Windows Server 2008, 3
Windows Server 2008 R2, 3
creating a forest using a GUI, 16
Windows Server 2012, 3
ADMT MMC snap-in not supported on, 148
creating a forest, 16
Exchange Server 2013 installation, prerequi‐
sites for, 682
integration of adprep into domain controller
promotion process, 353
promoting server to domain controller from
media, 64
raising functional level of Windows Server
R2 AD domain to, 27
restoring deleted domain controller, 80
using AdPrep to prepare domain or forest
for, 30
Windows Time Service, monitoring, 548
WINS, removing entries for demoted domain
controller, 18
Winsock, resetting, 82
WKGUIDs (well-known GUIDs), 117
mapped to container objects, 297
WMI (Windows Management Instrumentation)
applying WMI filter to a GPO, 333
creating WMI filter, 332
filters, 305
WMIC command-line component, 302
WMI Query Language (WQL), 332
wmic utility, 301
WMIPolicy container, 332
WQL (WMI Query Language), 332
X
xdr-fixup tool, 26
XML-based .admx format, GPO settings, 306
Z
zombie objects, 451, 577
zones, DNS, 462
configuring zone transfers, 470
converting primary zone to AD integrated
zone, 468
delegating control of AD integrated zone,
474
moving AD integrated zones into applica‐
tion partition, 469
viewing server’s zones, 466
832 | Index
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
858
|
About the Authors
Brian Svidergol specializes in Microsoft infrastructure and cloud-based solutions
around Windows, Active Directory, Microsoft Exchange, System Center, virtualization,
and MDOP. He holds the MCT, MCITP (EA), MCITP (VA), MCITP (Exchange 2010),
and several other Microsoft and industry certifications. Brian authored Microsoft Of‐
ficial Curriculum (MOC) course 6426C - Configuring and Troubleshooting Identity
and Access Solutions with Windows Server 2008 Active Directory. He has also worked
on Microsoft certification exam development and related training content for several
years. When he isn’t working on technology projects, he enjoys family time, basketball,
and gaming.
Robbie Allen is a technical leader at Cisco Systems, where he has been involved in the
deployment of Active Directory, DNS, DHCP, and several network management solu‐
tions. Robbie was named a Windows Server MVP in 2004 and 2005 for his contributions
to the Windows community and the publication of several popular O’Reilly books.
Robbie is currently studying at MIT in its System Design and Management program.
For more information, see Robbie’s website.
Colophon
The animal on the cover of Active Directory Cookbook, Fourth Edition is a bluefin tuna
(Thunnus thynnus), also known as a horse mackerel. It inhabits both the Atlantic and
Pacific Oceans in temperate and subtropical waters. The body of a bluefin tuna is a
metallic, deep blue on top, while the undersides and belly are silvery white. The first
dorsal fin is yellow or blue; the second is red or brown. The rear fin and finlets are yellow,
edged with black. The central caudal keel is black.
The bluefin tuna is one of the largest and fastest species of marine fish. An adult can
weigh as much as 1,500 pounds (680 kilograms) and can swim up to speeds of 55 miles
per hour (88.5 kilometers per hour). A bluefin tuna can swim across the Atlantic Ocean
in 40 days. Recent pop-up satellite tracking has revealed that the bluefin tuna can dive
to depths greater than 3,000 feet in a matter of minutes and still maintain a body tem‐
perature of 77 degrees Fahrenheit (25 degrees Celsius), even in near-freezing water.
Commercial fishing has reduced the stock of bluefin tuna to the extent that a single fish,
once caught, can be worth up to $40,000. However, the situation is reversible, and the
numbers of tuna could increase if the guidelines of the International Commission for
the Conservation of Atlantic Tuna (ICCAT), an intergovernmental fishing organization
that oversees tuna, are followed.
The cover image is from Dover Pictorial Archive. The cover font is Adobe ITC Gara‐
mond. The text font is Adobe Minion Pro; the heading font is Adobe Myriad Condensed;
and the code font is Dalton Maag’s Ubuntu Mono.
|
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.