index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
64
Detecting and Mitigating Microsoft Active Directory Compromises 59 4104 Microsoft Entra Connect PowerShell script block logging. Computer objects configured for unconstrained delegation events The events in Table 22 should be centrally logged and analysed in a timely manner to identify Active Directory compromises in...
https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF
65
Detecting and Mitigating Microsoft Active Directory Compromises 60 Glossary Acronym Definition AD CS Active Directory Certificate Services AD DS Active Directory Domain Services AD FS Active Directory Federation Services API application programming interface ASD Australian Signals Directorate AS-REP Authentication Ser...
https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF
66
Detecting and Mitigating Microsoft Active Directory Compromises 61 LSA Local Security Authority LSASS Local Security Authority Subsystem Service MFA multi-factor authentication NTLM New Technology Local Area Network Manager PHS Password Hash Synchronisation PTA Pass-Through Authentication PtH Pass the Hash SACL System ...
https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF
67
Disclaimer The material in this guide is of a general nature and should not be regarded as legal advice or relied on for assistance in any particular circumstance or emergency situation. In any important matter, you should seek appropriate independent professional advice in relation to your own circumstances. The Com...
https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF
0
null
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
1
null
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
2
Brian Svidergol and Robbie Allen FOURTH EDITION Active Directory Cookbook
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
3
Active Directory Cookbook, Fourth Edition by Brian Svidergol and Robbie Allen Copyright © 2013 Brian Svidergol and Robbie Allen. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
4
Table of Contents Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii 1. Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1. App...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
5
2.18. Viewing the Trusts for a Domain 41 2.19. Verifying a Trust 43 2.20. Resetting a Trust 45 2.21. Removing a Trust 45 2.22. Enabling SID Filtering for a Trust 47 2.23. Enabling Quarantine for a Trust 48 2.24. Managing Selective Authentication for a Trust 49 2.25. Finding Duplicate SIDs in a Domain 51 2.26. Adding Ad...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
6
3.30. Transferring a FSMO Role 97 3.31. Seizing a FSMO Role 99 3.32. Finding the PDC Emulator FSMO Role Owner via DNS 100 4. Searching and Manipulating Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 4.1. Viewing the RootDSE 104 4.2. Viewing the Attributes of an Object 106 4...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
7
5.5. Deleting the Objects in an OU 172 5.6. Deleting an OU 173 5.7. Moving the Objects in an OU to a Different OU 175 5.8. Moving an OU 177 5.9. Renaming an OU 178 5.10. Modifying an OU 179 5.11. Determining Approximately How Many Child Objects an OU Has 181 5.12. Delegating Control of an OU 182 5.13. Assigning or Remo...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
8
6.28. Preventing a User’s Password from Expiring 230 6.29. Finding Users Whose Passwords Are About to Expire 231 6.30. Viewing the RODCs That Have Cached a User’s Password 232 6.31. Setting a User’s Account Options (userAccountControl) 233 6.32. Setting a User’s Account to Expire 236 6.33. Determining a User’s Last Log...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
9
8.12. Changing the Maximum Number of Computers a User Can Join to the Domain 290 8.13. Modifying the Attributes of a computer Object 292 8.14. Finding Computers with a Particular OS 294 8.15. Binding to the Default Container for Computers 296 8.16. Changing the Default Container for Computers 298 8.17. Listing All the ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
10
9.31. Viewing the Effective PSO for a User 345 10. Schema. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 10.1. Registering the Active Directory Schema MMC Snap-in 349 10.2. Generating an OID to Use for a New Class or Attribute 350 1...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
11
11.14. Modifying the Sites That Are Part of a Site Link 410 11.15. Modifying the Cost for a Site Link 411 11.16. Enabling Change Notification for a Site Link 412 11.17. Modifying Replication Schedules 413 11.18. Disabling Site Link Transitivity or Site Link Schedules 415 11.19. Creating a Site Link Bridge 416 11.20. Fi...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
12
13.1. Creating a Forward Lookup Zone 463 13.2. Creating a Reverse Lookup Zone 464 13.3. Viewing a Server’s Zones 466 13.4. Converting a Zone to an AD Integrated Zone 468 13.5. Moving AD Integrated Zones into an Application Partition 469 13.6. Configuring Zone Transfers 470 13.7. Configuring Forwarding 471 13.8. Configu...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
13
14.15. Resetting an Object’s ACL to the Default Defined in the Schema 521 14.16. Enabling Strong Domain Authentication 521 14.17. Enabling List Object Access Mode 523 14.18. Modifying the ACL on Administrator Accounts 525 14.19. Viewing and Purging Your Kerberos Tickets 526 14.20. Forcing Kerberos to Use TCP 527 14.21....
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
14
16.4. Accessing Active Directory Snapshot Data 581 16.5. Restarting a Domain Controller in Directory Services Repair Mode 582 16.6. Resetting the Directory Services Repair Mode Administrator Password 584 16.7. Performing a Nonauthoritative Restore 585 16.8. Performing an Authoritative Restore of an Object or Subtree 58...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
15
18.9. Managing AD LDS Organizational Units 637 18.10. Managing AD LDS Users 639 18.11. Changing the Password for an AD LDS User 640 18.12. Enabling and Disabling an AD LDS User 641 18.13. Creating AD LDS Groups 643 18.14. Managing AD LDS Group Memberships 644 18.15. Viewing and Modifying AD LDS Object Attributes 645 18...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
16
20.16. Creating an Address List 700 20.17. Creating a Database Availability Group 701 20.18. Creating a Mailbox Database 703 20.19. Enabling or Disabling Anti-Malware Scanning 704 20.20. Enabling Message Tracking 705 21. Microsoft Forefront Identity Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
17
21.26. Searching Data in the Connector Space 769 21.27. Searching Data in the Metaverse 771 21.28. Deleting Data in the Connector Space and Metaverse 772 21.29. Extending Object Types to Include a New Attribute 773 21.30. Previewing Changes to the FIM Configuration 774 21.31. Committing Changes to Individual Identities...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
18
Preface In 1998, when Robbie first became involved with the Microsoft Windows 2000 Joint Development Program (JDP), very little data was available on Active Directory (AD). In the following months, and even after the initial release of Windows 2000, there were very few books or white papers to help early adopters of Ac...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
19
the Cookbook format provides. With this was born the first edition of Active Directory Cookbook, covering Active Directory tasks in Windows 2000 and Windows Server 2003 Active Directory. In 2005 and again in 2008, Laura E. Hunter revised the already popular Active Directory Cookbook to include an updated range of autom...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
20
Chapter 2, Forests, Domains, and Trusts Covers how to create and remove forests and domains, update the domain mode or functional levels, create different types of trusts, and perform other administra‐ tive trust tasks. Chapter 3, Domain Controllers, Global Catalogs, and FSMOs Covers promoting and demoting domain contr...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
21
Chapter 12, Replication Covers how to trigger and disable the Knowledge Consistency Checker (KCC), and how to query metadata, force replication, and determine which changes have yet to replicate between domain controllers. Chapter 13, DNS and DHCP Covers how to create zones and resource records, modify DNS server confi...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
22
Conventions Used in This Book The following typographical conventions are used in this book: Constant width Indicates classes, attributes, cmdlets, methods, objects, command-line elements, computer output, and code examples Constant width italic Indicates placeholders (for which you substitute an actual name) in exampl...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
23
If you feel your use of code examples falls outside fair use or the permission given here, feel free to contact us at permissions@oreilly.com. Safari® Books Online Safari Books Online (www.safaribooksonline.com) is an on-demand digital library that delivers expert content in both book and video form from the world’s le...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
24
Watch us on YouTube: http://www.youtube.com/oreillymedia Acknowledgments First, let me thank the authors of the original editions—Robbie and Laura—as without you guys, my job of updating the book for the Fourth Edition would not have been possible! Thankfully, I was able to start with a fantastic and well-regarded book...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
25
null
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
26
CHAPTER 1 Getting Started 1.1. Approach to the Book If you are familiar with the O’Reilly Cookbook format, which can be seen in other popular books such as the Perl Cookbook, Java Cookbook, and DNS and BIND Cook‐ book, then the layout of this book will be familiar to you. The book is composed of 21 chapters, each conta...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
27
per recipe, we include up to three solutions using GUI, CLI, and programmatic exam‐ ples; in some cases you’ll find more than one option for a given solution, as in the case where there is more than one command-line utility to perform a particular task. How‐ ever, in cases where one of the methods cannot be used or wou...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
28
Windows second. In fact, the majority of the GUI solutions will work unchanged all the way back to Windows 2000. The PowerShell solutions will work out of the box with Windows Server 2008 R2 or newer domain controllers. By using the Active Directory Management Gateway Service, the PowerShell solutions will work with do...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
29
You can also open a Windows command prompt using alternate credentials, which will allow you to run commands using these elevated credentials until you close the com‐ mand prompt window. To open a command prompt using the runas command, simply type runas /user:administrator@adatum.com cmd. To run a Microsoft Management...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
30
command could get quite long. It would be easier to use a GUI editor, such as ADSI Edit, to do the task instead. The LDAP Data Interchange Format (LDIF) was designed to address this issue. Defined in RFC 2849, LDIF allows you to represent directory additions, modifications, and deletions in a text-based file, which you...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
31
See Recipes 4.28 and 4.29 for more details on how to use the ldifde utility to import and export LDIF files. 1.4. Replaceable Text This book is filled with examples. Every recipe consists of one or more examples that show how to accomplish a task. Most CLI- and PowerShell-based solutions use param‐ eters that are based...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
32
not realistic to think that we have covered every possible task. In fact, working on this book has made us realize just how much Active Directory administrators need to know. Now that Active Directory has been around for a number of years, a significant user base has been built, which has led to other great resources o...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
33
Websites While the Web is often changing, the following websites are a mainstay for Active Directory−related material: Microsoft Active Directory home page This site is the starting point for Active Directory information provided by Microsoft. It contains links to white papers, case studies, and tools. Microsoft PowerS...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
34
Directory Programming Just as the ActiveDir list is crucial for AD administrators, this site is extremely valuable for AD developers. It also includes user forums where participants can post questions about AD programming topics. Mailing List ActiveDir The ActiveDir mailing list is where the most advanced Active Direct...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
35
null
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
36
CHAPTER 2 Forests, Domains, and Trusts 2.0. Introduction To the layperson, the title of this chapter may seem like a hodgepodge of unrelated terms. For the seasoned Active Directory administrator, however, these terms represent the most fundamental and, perhaps, most important concepts within Active Directory. In simpl...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
37
between them. Without trust relationships, users from one forest cannot access resour‐ ces located in the other forest. In our conglomerate scenario, if you want users in each company to be able to access resources within their own domain, as well as the domains belonging to other companies in the organization, using s...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
38
There are many more issues to consider when deciding how many forests, domains, and domain trees to implement. For a thorough ex‐ planation of Active Directory design considerations, we recommend reading Active Directory, Fifth Edition, by Brian Desmond et al. (O’Reilly). In this chapter, we cover the most common tasks...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
39
Schema NC This contains the objects that describe how data can be structured and stored in Active Directory. The classSchema objects in the Schema NC represent class definitions for objects. The attributeSchema objects describe what data can be stored with classes. The Schema NC is replicated to all domain controllers ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
40
The Anatomy of a Trust Microsoft has relied on trust relationships to provide resource access across domain boundaries since the early days of Windows NT. Before Active Directory, all trust re‐ lationships were one-way and nontransitive in nature. A one-way trust relationship, as the name suggests, enables resource acc...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
41
Solution Using a graphical user interface On a Windows Server 2008 R2 computer: 1. Open the Server Manager utility. In the lefthand pane, click Roles. 2. In the righthand pane, click Add Roles. 3. Click Next. Place a checkmark next to Active Directory Domain Services. 4. Click Next, click Add Required Features if appli...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
42
12. Review the selections given while using the wizard. Optionally, click “View script” to see the PowerShell command and then click Next. 13. After the prerequisites have been successfully validated, click Install to begin the process. After promotion, the server will automatically reboot. Using PowerShell The Install...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
43
2.2. Removing a Forest Problem You want to tear down a forest and decommission any domains contained within it because you no longer need it. Solution To remove a forest, you need to demote all the domain controllers in the forest. When you demote an existing domain controller, you will be given the option to demote th...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
44
To fully remove all traces of an Active Directory forest in Windows Server 2008 and later, you should also remove the Active Directory Domain Services role that has been installed on any of the domain con‐ trollers. This will remove the actual system files associated with the AD DS server role. You may also want to rem...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
45
Using PowerShell The Install-ADDSDomain cmdlet is used to create a new domain. The following example installs a new child domain in an existing forest and installs DNS: > Install-ADDSDomain -NewDomainName <newdomainname> -ParentDomainName↵ contoso.com; -DomainMode Win2012 -DomainType ChildDomain -InstallDNS:$true↵ -Ne...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
46
domain controller in the domain, be sure to select the “Last domain controller in the domain” option in the wizard so that the objects associated with the domain get re‐ moved. If you do not select this option for the last domain controller in the domain, take a look at Recipe 2.5 for how to remove an orphaned domain. ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
47
To fully remove all traces of an Active Directory forest in Windows Server 2008 and later, you should also remove the Active Directory Domain Services role that has been installed on any of the Windows Server 2008 or later domain controllers. This will remove the actual system files associated with the AD DS server rol...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
48
19 select operation target 20 list naming context 21 select naming context <# of the domain DN> 22 quit 23 remove selected naming context (confirm when prompted) Discussion Removing an orphaned domain consists of removing the domain object for the domain (e.g., dc=emea,dc=adatum,dc=com), all of its child objects, and t...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
49
Using PowerShell You can retrieve this information using the Get-ADForest command, as shown here: > Get-ADForest | Select Domains Discussion Using a graphical user interface If you want to view the domains for a forest other than the one you are logged in to, right-click on Active Directory Domains and Trusts in the le...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
50
You can also retrieve this information by using the Active Directory Administrative Center, as follows: 1. Open the Active Directory Administrative Center. 2. Right-click the domain in the left pane and then select Properties. The NetBIOS name will be shown in the “Pre-Windows 2000 domain name” field. Using a command-l...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
51
a very involved process and should be done only when absolutely necessary. Changing the name of a domain can have an impact on everything from DNS, replication, and GPOs to DFS and Certificate Services. A domain rename also requires rebooting all domain controllers, member servers, and client computers in the domain! S...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
52
See Also “Introduction to Administering Active Directory Domain Rename” 2.9. Raising the Domain Functional Level to Windows Server 2012 Problem You want to change the functional level of a Windows Server 2008 R2 Active Directory domain to the Windows Server 2012 functional level. Solution Using a graphical user interfa...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
53
Table 2-2. Active Directory domain functional levels Functional level msDS-Behavior-Version Valid operating systems for domain controllers Windows Server 2003 2 Windows Server 2003 and later Windows Server 2008 3 Windows Server 2008 and later Windows Server 2008 R2 4 Windows Server 2008 R2 and later Windows Server 2012...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
54
3. Ensure that “Windows Server 2012” is displayed in the available forest functional level drop-down list and then click Raise. A warning dialog box will appear that mentions that the process may not be reversible. Click OK to proceed. After a few seconds, you should see a message stating whether the operation was succ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
55
See Also “Upgrade Domain Controllers to Windows Server 2012” for information about the forest and domain functional levels and other prerequisites; Recipe 2.11 for preparing a forest with AdPrep 2.11. Using AdPrep to Prepare a Domain or Forest for Windows Server 2012 Problem You want to upgrade your existing Active Dir...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
56
permissions on existing Group Policy Objects (GPOs) to allow for updated functionality in the Group Policy Management Console (GPMC): > adprep /domainprep /gpprep The Windows Server 2012 preparation, in addition to /forestprep, /domainprep, and /domainprep /gpprep, also includes /rodcprep to allow for the installation ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
57
Solution To determine whether adprep /forestprep has completed for a Windows Server 2012 upgrade, run ADSI Edit and then follow these steps: 1. In the left pane, right-click on ADSI Edit and then click Connect To. 2. In the Connection Settings window, click the “Select a well known Naming Context” radio button and then...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
58
Discussion As described in Recipe 2.11, the AdPrep utility is used to prepare an Active Directory forest for the upgrade to Windows Server 2012. One of the nice features of AdPrep is that it stores its progress in Active Directory. For /forestprep, the objectVersion attribute of the schema indicates the level of the fo...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
59
Figure 2-3. ADSI Edit showing the revision attribute of an AD DS domain that was updated to Windows Server 2012 by running adprep /domainprep See Also Recipe 2.11 for running AdPrep; the Microsoft TechNet site for additional information about the Windows Server 2012 AdPrep process 2.13. Checking Whether a Windows Domai...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
60
organization prepare for an upgrade to Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012. Discussion Prior to Windows Server 2008, the WINNT32 command with the /checkupgradeon ly switch could be used to assess whether a domain controller could be upgraded. Windows Server, since 2008, has eliminated t...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
61
12. A message indicating that the trust relationship was created successfully will appear. Click Next to configure the new trust. 13. Perform the same steps on the trusted domain. Then, on both sides, select Yes to confirm the incoming trust and then click Next. 14. A success message will appear. Click Finish. 15. A me...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
62
2.15. Creating a Transitive Trust Between Two AD Forests This recipe requires at least the Windows Server 2003 forest functional level in both forests. Problem You want to create a transitive trust between two AD forests. This causes all domains in both forests to trust each other without the need for additional trusts...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
63
Using a command-line interface > netdom trust <Forest1DNSName> /Domain:<Forest2DNSName> /Twoway /Transitive↵ /ADD [/UserD:<Forest2AdminUser> /PasswordD:*]↵ [/UserO:<Forest1AdminUser> /PasswordO:*] For example, to create a two-way forest trust from the AD forest adatum.com to the AD forest othercorp.com, use the followi...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
64
Solution Using a graphical user interface 1. Open the Active Directory Domains and Trusts snap-in (domain.msc). 2. In the left pane, right-click the forest root domain and select Properties. 3. Click on the Trusts tab. 4. Click the New Trust button. Then click Next. 5. Enter the name of the domain and then click Next. ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
65
Discussion Consider the forest shown in Figure 2-5. It has five domains in a single domain tree. For authentication requests for Domain 3 to be processed by Domain 5, the request must traverse the path from Domain 3 to Domain 2 to Domain 1 to Domain 4 to Domain 5. If you create a shortcut trust between Domain 3 and Dom...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
66
8. Verify that a two-way trust is selected for the direction of the trust and then click Next. 9. Enter a complex password for the trust password; click Next. Note that the password must meet the domain password policy. 10. Review the trust settings summary and then click Next. 11. A success message will appear. Click ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
67
Solution Using a graphical user interface 1. Open the Active Directory Domains and Trusts snap-in (domain.msc). 2. In the left pane, right-click the domain you want to view and select Properties. 3. Click on the Trusts tab. Using a command-line interface To enumerate domain trusts using the netdom utility, use the foll...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
68
Discussion Using a graphical user interface You can view the properties of a particular trust by clicking on a trust and clicking the Properties button. Using a command-line interface You can include the /Direct switch with netdom if you want to view only direct-trust relationships. If you don’t use /Direct, implicit t...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
69
Solution Using a graphical user interface For the Windows Server 2003, Windows Server 2008, and Windows Server 2012 ver‐ sions of the Active Directory Domains and Trusts snap-in: 1. In the left pane, right-click on the trusting domain and select Properties. 2. Click the Trusts tab. 3. Click the domain that is associate...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
70
2.20. Resetting a Trust Problem You want to reset a trust password. If you’ve determined a trust is broken, you need to reset it, which will allow users to authenticate across it again. Solution Using a graphical user interface Follow the same directions as in Recipe 2.19. The option to reset the trust will be pre‐ sen...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
71
Solution Using a graphical user interface 1. Open the Active Directory Domains and Trusts snap-in (domain.msc). 2. In the left pane, right-click on the trusting domain and select Properties. 3. Click the Trusts tab. 4. Click on the domain that is associated with the trust you want to remove. 5. Click the Remove button....
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
72
2.22. Enabling SID Filtering for a Trust Problem You want to enable Security Identifier (SID) filtering for a trust. By enabling SID filter‐ ing, you can keep a hacker from spoofing an SID across a trust. Solution Using a command-line interface > netdom trust <TrustingDomain> /Domain:<TrustedDomain> /EnableSIDHistory:N...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
73
under SP4 or later. You can disable SID filtering by running the netdom command with the /EnableSIDHistory:Yes switch. See Also MS KB 289243 (MS02-001: Forged SID Could Result in Elevated Privileges in Windows 2000) 2.23. Enabling Quarantine for a Trust Problem You want to enable Quarantine for a trust. By enabling Qua...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
74
2.24. Managing Selective Authentication for a Trust Problem You want to enable or disable Selective Authentication for a trust. By enabling Selective Authentication, you can control which computers—in a trusting domain—users in a trusted domain can access. Disabling Selective Authentication will allow users in the trus...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
75
To grant permissions on individual computers in the trusting domain: 1. Open the Active Directory Users and Computers snap-in (dsa.msc). 2. Right-click on the computer object on which you wish to grant permissions and select Properties. 3. On the Security tab, select the user or group that you want to authorize, and se...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
76
2.25. Finding Duplicate SIDs in a Domain Problem You want to find any duplicate SIDs in a domain. Generally, duplicate SIDs in a domain should not exist, but it is possible in some situations, such as when the relative identifier (RID) FSMO role owner has to be seized. Solution Using a command-line interface To find du...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
77
See Also MS KB 816099 (How to Find and Clean Up Duplicate Security Identifiers with Ntdsutil in Windows Server 2003) 2.26. Adding Additional Fields to Active Directory Users and Computers Problem You want to add to the list of attributes by which you can search and sort records within the ADUC (Active Directory Users a...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
78
Using a command-line interface First create an LDIF file containing the following information and save it as modi fy_display_specifiers.ldif: dn: cn=computer-display,cn=409,cn=DisplaySpecifiers, cn=Configuration, <ForestRootDN> changetype: modify add: attributeDisplayNames attributeDisplayNames: operatingSystemService...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
79
null
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
80
CHAPTER 3 Domain Controllers, Global Catalogs, and FSMOs 3.0. Introduction Domain controllers are servers that host an Active Directory domain and provide au‐ thentication and directory services to clients. A domain controller (DC) can only be authoritative (i.e., it can only process authentication requests) for a sing...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
81
holders, three for each of the three domains. See Recipe 3.29 for more information on FSMO roles. In Windows Server 2008, Microsoft introduced the Read-Only Domain Controller, or RODC, to improve security for organizations that need to deploy DCs in branch offices or other remote locations where the physical or logical...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
82
Domain controllers are also represented by several objects under the Sites container in the Configuration NC. The Sites container stores objects that are needed to create a site topology, including site, subnet, sitelink, and server objects. The site topology is necessary so that domain controllers can replicate data e...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
83
• Users and computers whose password secrets are permitted to be cached on indi‐ vidual RODCs or on all RODCs in a domain • Users and computers whose password secrets are never permitted to be cached on individual RODCs, or on all RODCs in a domain In order to maintain this information, each RODC contains a number of a...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
84
4. Select the desired domain controller options: “Domain Name System (DNS) server,” “Global Catalog (GC),” and/or “Read only domain controller (RODC).” 5. Type a Directory Services Restore Mode (DSRM) password and then click Next. 6. Select the desired additional options: install from media—if installing from media —an...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
85
Solution 1. First, add the Active Directory Domain Services role using Server Manager. 2. Click “Promote this server to a domain controller” in the notification area. 3. Verify that the “Add a domain controller to an existing domain” option is selected. 4. Type the domain name and domain credentials and then click Next...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
86
3.3. Performing a Two-Stage RODC Installation Problem You want to perform a two-stage promotion of a server to an RODC in a Windows Server 2012 domain. This recipe requires that at least one writable Windows Server 2008 or later domain controller is present in the domain. Solution The first stage of the two-stage insta...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
87
The second stage of the RODC installation will be completed from the console of the server that is to be configured as an RODC, using the following steps: 1. Click “Promote this server to a domain controller” in the Server Manager notifi‐ cation area and then click Next. 2. Enter the parent domain name and credentials ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
88
Solution Using a graphical user interface 1. Open Active Directory Users and Computers and then select the built-in Domain Controllers OU. 2. Locate the desired RODC, right-click it, and then click Properties. 3. Select the Password Replication Policy tab. 4. Click Add. Then click the “Allow passwords for the account t...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
89
— Server operators • msDS-RevealOnDemandGroup — Allowed RODC Password Replication Group When Windows evaluates the Password Replication Policy, a “Deny” setting would override an “Allow” setting; for example, if a user is a member of two security groups that are configured with contradictory settings. As with most aspe...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
90
c. create sysvol full <PathToSaveData> 2. Copy the media from the saved located to the new server that will be promoted. 3. Add the Active Directory Domain Services role. After the role installation, a noti‐ fication will appear within Server Manager. 4. Click Notifications and then click “Promote this server to a doma...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
91
Be sure that the age of the backup files you are using is significantly less than your AD forest’s tombstone lifetime. If you install a domain con‐ troller using backup files that are older than the tombstone lifetime value, you could run into issues with deleted objects being reinjected into the Active Directory datab...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
92
10. Review the options and then click Demote. Using PowerShell 1. Open PowerShell on the domain controller to be demoted. 2. Run the Uninstall-ADDSDomainController command. 3. Supply a new password for the local Administrator account. 4. Type Y and press Enter to confirm the operation. Note that the server will reboot ...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
93
Solution You can automate the promotion of a domain controller by using PowerShell. Use the Install-ADDSDomainController cmdlet, as shown in the following example: Import-Module ADDSDeployment Install-ADDSDomainController↵ -CreateDNSDelegation↵ -Credential (Get-Credential)↵ -CriticalReplicationOnly:$false↵ -DatabasePat...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
94
logs the information that is displayed as dcpromo progresses. The Dcpromoui.log file is much more detailed and captures discrete actions that occur during dcpromo process‐ ing, including any user input. A sample dcpromoui.log file might look something like this: dcpromoui 404.554 0000 11:09:01.479 opening log file↵ C:...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
95
3.9. Verifying the Promotion of a Domain Controller Problem You want to verify that a domain controller has been successfully promoted within an Active Directory domain. Solution Using a command-line interface > dcdiag /test:replications > dcdiag /s:<DCName> /test:knowsofroleholders > dcdiag /s:<DCName> /test:fsmocheck...
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf