index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
64 | Detecting and Mitigating Microsoft Active Directory Compromises 59
4104 Microsoft Entra
Connect
PowerShell script block logging.
Computer objects configured for unconstrained delegation events
The events in Table 22 should be centrally logged and analysed in a timely manner to identify Active Directory
compromises in... | https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF |
65 | Detecting and Mitigating Microsoft Active Directory Compromises 60
Glossary
Acronym Definition
AD CS Active Directory Certificate Services
AD DS Active Directory Domain Services
AD FS Active Directory Federation Services
API application programming interface
ASD Australian Signals Directorate
AS-REP Authentication Ser... | https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF |
66 | Detecting and Mitigating Microsoft Active Directory Compromises 61
LSA Local Security Authority
LSASS Local Security Authority Subsystem Service
MFA multi-factor authentication
NTLM New Technology Local Area Network Manager
PHS Password Hash Synchronisation
PTA Pass-Through Authentication
PtH Pass the Hash
SACL System ... | https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF |
67 | Disclaimer
The material in this guide is of a general nature and should not be regarded as legal advice or relied on for assistance
in any particular circumstance or emergency situation. In any important matter, you should seek appropriate
independent professional advice in relation to your own circumstances.
The Com... | https://media.defense.gov/2024/Sep/25/2003553985/-1/-1/0/CTR-Detecting-and-Mitigating-AD-Compromises.PDF |
0 | null | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
1 | null | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
2 | Brian Svidergol and Robbie Allen
FOURTH EDITION
Active Directory Cookbook | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
3 | Active Directory Cookbook, Fourth Edition
by Brian Svidergol and Robbie Allen
Copyright © 2013 Brian Svidergol and Robbie Allen. All rights reserved.
Printed in the United States of America.
Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.
O’Reilly books may be purchased for educ... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
4 | Table of Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
1. Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1. App... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
5 | 2.18. Viewing the Trusts for a Domain 41
2.19. Verifying a Trust 43
2.20. Resetting a Trust 45
2.21. Removing a Trust 45
2.22. Enabling SID Filtering for a Trust 47
2.23. Enabling Quarantine for a Trust 48
2.24. Managing Selective Authentication for a Trust 49
2.25. Finding Duplicate SIDs in a Domain 51
2.26. Adding Ad... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
6 | 3.30. Transferring a FSMO Role 97
3.31. Seizing a FSMO Role 99
3.32. Finding the PDC Emulator FSMO Role Owner via DNS 100
4. Searching and Manipulating Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
4.1. Viewing the RootDSE 104
4.2. Viewing the Attributes of an Object 106
4... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
7 | 5.5. Deleting the Objects in an OU 172
5.6. Deleting an OU 173
5.7. Moving the Objects in an OU to a Different OU 175
5.8. Moving an OU 177
5.9. Renaming an OU 178
5.10. Modifying an OU 179
5.11. Determining Approximately How Many Child Objects an OU Has 181
5.12. Delegating Control of an OU 182
5.13. Assigning or Remo... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
8 | 6.28. Preventing a User’s Password from Expiring 230
6.29. Finding Users Whose Passwords Are About to Expire 231
6.30. Viewing the RODCs That Have Cached a User’s Password 232
6.31. Setting a User’s Account Options (userAccountControl) 233
6.32. Setting a User’s Account to Expire 236
6.33. Determining a User’s Last Log... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
9 | 8.12. Changing the Maximum Number of Computers a User Can Join to the
Domain 290
8.13. Modifying the Attributes of a computer Object 292
8.14. Finding Computers with a Particular OS 294
8.15. Binding to the Default Container for Computers 296
8.16. Changing the Default Container for Computers 298
8.17. Listing All the ... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
10 | 9.31. Viewing the Effective PSO for a User 345
10. Schema. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
10.1. Registering the Active Directory Schema MMC Snap-in 349
10.2. Generating an OID to Use for a New Class or Attribute 350
1... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
11 | 11.14. Modifying the Sites That Are Part of a Site Link 410
11.15. Modifying the Cost for a Site Link 411
11.16. Enabling Change Notification for a Site Link 412
11.17. Modifying Replication Schedules 413
11.18. Disabling Site Link Transitivity or Site Link Schedules 415
11.19. Creating a Site Link Bridge 416
11.20. Fi... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
12 | 13.1. Creating a Forward Lookup Zone 463
13.2. Creating a Reverse Lookup Zone 464
13.3. Viewing a Server’s Zones 466
13.4. Converting a Zone to an AD Integrated Zone 468
13.5. Moving AD Integrated Zones into an Application Partition 469
13.6. Configuring Zone Transfers 470
13.7. Configuring Forwarding 471
13.8. Configu... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
13 | 14.15. Resetting an Object’s ACL to the Default Defined in the Schema 521
14.16. Enabling Strong Domain Authentication 521
14.17. Enabling List Object Access Mode 523
14.18. Modifying the ACL on Administrator Accounts 525
14.19. Viewing and Purging Your Kerberos Tickets 526
14.20. Forcing Kerberos to Use TCP 527
14.21.... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
14 | 16.4. Accessing Active Directory Snapshot Data 581
16.5. Restarting a Domain Controller in Directory Services Repair Mode 582
16.6. Resetting the Directory Services Repair Mode Administrator Password 584
16.7. Performing a Nonauthoritative Restore 585
16.8. Performing an Authoritative Restore of an Object or Subtree 58... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
15 | 18.9. Managing AD LDS Organizational Units 637
18.10. Managing AD LDS Users 639
18.11. Changing the Password for an AD LDS User 640
18.12. Enabling and Disabling an AD LDS User 641
18.13. Creating AD LDS Groups 643
18.14. Managing AD LDS Group Memberships 644
18.15. Viewing and Modifying AD LDS Object Attributes 645
18... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
16 | 20.16. Creating an Address List 700
20.17. Creating a Database Availability Group 701
20.18. Creating a Mailbox Database 703
20.19. Enabling or Disabling Anti-Malware Scanning 704
20.20. Enabling Message Tracking 705
21. Microsoft Forefront Identity Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
17 | 21.26. Searching Data in the Connector Space 769
21.27. Searching Data in the Metaverse 771
21.28. Deleting Data in the Connector Space and Metaverse 772
21.29. Extending Object Types to Include a New Attribute 773
21.30. Previewing Changes to the FIM Configuration 774
21.31. Committing Changes to Individual Identities... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
18 | Preface
In 1998, when Robbie first became involved with the Microsoft Windows 2000 Joint
Development Program (JDP), very little data was available on Active Directory (AD).
In the following months, and even after the initial release of Windows 2000, there were
very few books or white papers to help early adopters of Ac... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
19 | the Cookbook format provides. With this was born the first edition of Active Directory
Cookbook, covering Active Directory tasks in Windows 2000 and Windows Server 2003
Active Directory.
In 2005 and again in 2008, Laura E. Hunter revised the already popular Active Directory
Cookbook to include an updated range of autom... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
20 | Chapter 2, Forests, Domains, and Trusts
Covers how to create and remove forests and domains, update the domain mode
or functional levels, create different types of trusts, and perform other administra‐
tive trust tasks.
Chapter 3, Domain Controllers, Global Catalogs, and FSMOs
Covers promoting and demoting domain contr... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
21 | Chapter 12, Replication
Covers how to trigger and disable the Knowledge Consistency Checker (KCC), and
how to query metadata, force replication, and determine which changes have yet
to replicate between domain controllers.
Chapter 13, DNS and DHCP
Covers how to create zones and resource records, modify DNS server confi... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
22 | Conventions Used in This Book
The following typographical conventions are used in this book:
Constant width
Indicates classes, attributes, cmdlets, methods, objects, command-line elements,
computer output, and code examples
Constant width italic
Indicates placeholders (for which you substitute an actual name) in exampl... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
23 | If you feel your use of code examples falls outside fair use or the permission given here,
feel free to contact us at permissions@oreilly.com.
Safari® Books Online
Safari Books Online (www.safaribooksonline.com) is an on-demand
digital library that delivers expert content in both book and video
form from the world’s le... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
24 | Watch us on YouTube: http://www.youtube.com/oreillymedia
Acknowledgments
First, let me thank the authors of the original editions—Robbie and Laura—as without
you guys, my job of updating the book for the Fourth Edition would not have been
possible! Thankfully, I was able to start with a fantastic and well-regarded book... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
25 | null | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
26 | CHAPTER 1
Getting Started
1.1. Approach to the Book
If you are familiar with the O’Reilly Cookbook format, which can be seen in other
popular books such as the Perl Cookbook, Java Cookbook, and DNS and BIND Cook‐
book, then the layout of this book will be familiar to you. The book is composed of 21
chapters, each conta... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
27 | per recipe, we include up to three solutions using GUI, CLI, and programmatic exam‐
ples; in some cases you’ll find more than one option for a given solution, as in the case
where there is more than one command-line utility to perform a particular task. How‐
ever, in cases where one of the methods cannot be used or wou... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
28 | Windows second. In fact, the majority of the GUI solutions will work unchanged all the
way back to Windows 2000. The PowerShell solutions will work out of the box with
Windows Server 2008 R2 or newer domain controllers. By using the Active Directory
Management Gateway Service, the PowerShell solutions will work with do... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
29 | You can also open a Windows command prompt using alternate credentials, which will
allow you to run commands using these elevated credentials until you close the com‐
mand prompt window. To open a command prompt using the runas command, simply
type runas /user:administrator@adatum.com cmd.
To run a Microsoft Management... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
30 | command could get quite long. It would be easier to use a GUI editor, such as ADSI
Edit, to do the task instead.
The LDAP Data Interchange Format (LDIF) was designed to address this issue. Defined
in RFC 2849, LDIF allows you to represent directory additions, modifications, and
deletions in a text-based file, which you... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
31 | See Recipes 4.28 and 4.29 for more details on how to use the ldifde utility to import and
export LDIF files.
1.4. Replaceable Text
This book is filled with examples. Every recipe consists of one or more examples that
show how to accomplish a task. Most CLI- and PowerShell-based solutions use param‐
eters that are based... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
32 | not realistic to think that we have covered every possible task. In fact, working on this
book has made us realize just how much Active Directory administrators need to know.
Now that Active Directory has been around for a number of years, a significant user
base has been built, which has led to other great resources o... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
33 | Websites
While the Web is often changing, the following websites are a mainstay for Active
Directory−related material:
Microsoft Active Directory home page
This site is the starting point for Active Directory information provided by
Microsoft. It contains links to white papers, case studies, and tools.
Microsoft PowerS... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
34 | Directory Programming
Just as the ActiveDir list is crucial for AD administrators, this site is extremely
valuable for AD developers. It also includes user forums where participants can
post questions about AD programming topics.
Mailing List
ActiveDir
The ActiveDir mailing list is where the most advanced Active Direct... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
35 | null | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
36 | CHAPTER 2
Forests, Domains, and Trusts
2.0. Introduction
To the layperson, the title of this chapter may seem like a hodgepodge of unrelated terms.
For the seasoned Active Directory administrator, however, these terms represent the
most fundamental and, perhaps, most important concepts within Active Directory. In
simpl... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
37 | between them. Without trust relationships, users from one forest cannot access resour‐
ces located in the other forest. In our conglomerate scenario, if you want users in each
company to be able to access resources within their own domain, as well as the domains
belonging to other companies in the organization, using s... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
38 | There are many more issues to consider when deciding how many
forests, domains, and domain trees to implement. For a thorough ex‐
planation of Active Directory design considerations, we recommend
reading Active Directory, Fifth Edition, by Brian Desmond et al.
(O’Reilly).
In this chapter, we cover the most common tasks... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
39 | Schema NC
This contains the objects that describe how data can be structured and stored in
Active Directory. The classSchema objects in the Schema NC represent class
definitions for objects. The attributeSchema objects describe what data can be
stored with classes. The Schema NC is replicated to all domain controllers ... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
40 | The Anatomy of a Trust
Microsoft has relied on trust relationships to provide resource access across domain
boundaries since the early days of Windows NT. Before Active Directory, all trust re‐
lationships were one-way and nontransitive in nature. A one-way trust relationship, as
the name suggests, enables resource acc... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
41 | Solution
Using a graphical user interface
On a Windows Server 2008 R2 computer:
1. Open the Server Manager utility. In the lefthand pane, click Roles.
2. In the righthand pane, click Add Roles.
3. Click Next. Place a checkmark next to Active Directory Domain Services.
4. Click Next, click Add Required Features if appli... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
42 | 12. Review the selections given while using the wizard. Optionally, click “View script”
to see the PowerShell command and then click Next.
13. After the prerequisites have been successfully validated, click Install to begin the
process. After promotion, the server will automatically reboot.
Using PowerShell
The Install... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
43 | 2.2. Removing a Forest
Problem
You want to tear down a forest and decommission any domains contained within it
because you no longer need it.
Solution
To remove a forest, you need to demote all the domain controllers in the forest. When
you demote an existing domain controller, you will be given the option to demote th... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
44 | To fully remove all traces of an Active Directory forest in Windows
Server 2008 and later, you should also remove the Active Directory
Domain Services role that has been installed on any of the domain con‐
trollers. This will remove the actual system files associated with the AD
DS server role. You may also want to rem... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
45 | Using PowerShell
The Install-ADDSDomain cmdlet is used to create a new domain. The following example
installs a new child domain in an existing forest and installs DNS:
> Install-ADDSDomain -NewDomainName <newdomainname> -ParentDomainName↵
contoso.com; -DomainMode Win2012 -DomainType ChildDomain -InstallDNS:$true↵
-Ne... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
46 | domain controller in the domain, be sure to select the “Last domain controller in the
domain” option in the wizard so that the objects associated with the domain get re‐
moved. If you do not select this option for the last domain controller in the domain,
take a look at Recipe 2.5 for how to remove an orphaned domain.
... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
47 | To fully remove all traces of an Active Directory forest in Windows Server 2008 and
later, you should also remove the Active Directory Domain Services role that has been
installed on any of the Windows Server 2008 or later domain controllers. This will
remove the actual system files associated with the AD DS server rol... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
48 | 19 select operation target
20 list naming context
21 select naming context <# of the domain DN>
22 quit
23 remove selected naming context (confirm when prompted)
Discussion
Removing an orphaned domain consists of removing the domain object for the domain
(e.g., dc=emea,dc=adatum,dc=com), all of its child objects, and t... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
49 | Using PowerShell
You can retrieve this information using the Get-ADForest command, as shown here:
> Get-ADForest | Select Domains
Discussion
Using a graphical user interface
If you want to view the domains for a forest other than the one you are logged in to,
right-click on Active Directory Domains and Trusts in the le... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
50 | You can also retrieve this information by using the Active Directory Administrative
Center, as follows:
1. Open the Active Directory Administrative Center.
2. Right-click the domain in the left pane and then select Properties. The NetBIOS
name will be shown in the “Pre-Windows 2000 domain name” field.
Using a command-l... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
51 | a very involved process and should be done only when absolutely necessary. Changing
the name of a domain can have an impact on everything from DNS, replication, and
GPOs to DFS and Certificate Services. A domain rename also requires rebooting all
domain controllers, member servers, and client computers in the domain!
S... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
52 | See Also
“Introduction to Administering Active Directory Domain Rename”
2.9. Raising the Domain Functional Level to Windows
Server 2012
Problem
You want to change the functional level of a Windows Server 2008 R2 Active Directory
domain to the Windows Server 2012 functional level.
Solution
Using a graphical user interfa... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
53 | Table 2-2. Active Directory domain functional levels
Functional level msDS-Behavior-Version Valid operating systems for domain controllers
Windows Server 2003 2 Windows Server 2003 and later
Windows Server 2008 3 Windows Server 2008 and later
Windows Server 2008 R2 4 Windows Server 2008 R2 and later
Windows Server 2012... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
54 | 3. Ensure that “Windows Server 2012” is displayed in the available forest functional
level drop-down list and then click Raise. A warning dialog box will appear that
mentions that the process may not be reversible. Click OK to proceed.
After a few seconds, you should see a message stating whether the operation was
succ... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
55 | See Also
“Upgrade Domain Controllers to Windows Server 2012” for information about the
forest and domain functional levels and other prerequisites; Recipe 2.11 for preparing
a forest with AdPrep
2.11. Using AdPrep to Prepare a Domain or Forest for
Windows Server 2012
Problem
You want to upgrade your existing Active Dir... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
56 | permissions on existing Group Policy Objects (GPOs) to allow for updated functionality
in the Group Policy Management Console (GPMC):
> adprep /domainprep /gpprep
The Windows Server 2012 preparation, in addition to /forestprep, /domainprep,
and /domainprep /gpprep, also includes /rodcprep to allow for the installation ... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
57 | Solution
To determine whether adprep /forestprep has completed for a Windows Server 2012
upgrade, run ADSI Edit and then follow these steps:
1. In the left pane, right-click on ADSI Edit and then click Connect To.
2. In the Connection Settings window, click the “Select a well known Naming Context”
radio button and then... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
58 | Discussion
As described in Recipe 2.11, the AdPrep utility is used to prepare an Active Directory
forest for the upgrade to Windows Server 2012. One of the nice features of AdPrep is
that it stores its progress in Active Directory. For /forestprep, the objectVersion
attribute of the schema indicates the level of the fo... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
59 | Figure 2-3. ADSI Edit showing the revision attribute of an AD DS domain that was
updated to Windows Server 2012 by running adprep /domainprep
See Also
Recipe 2.11 for running AdPrep; the Microsoft TechNet site for additional information
about the Windows Server 2012 AdPrep process
2.13. Checking Whether a Windows Domai... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
60 | organization prepare for an upgrade to Windows Server 2008, Windows Server 2008
R2, and Windows Server 2012.
Discussion
Prior to Windows Server 2008, the WINNT32 command with the /checkupgradeon
ly switch could be used to assess whether a domain controller could be upgraded.
Windows Server, since 2008, has eliminated t... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
61 | 12. A message indicating that the trust relationship was created successfully will appear.
Click Next to configure the new trust.
13. Perform the same steps on the trusted domain. Then, on both sides, select Yes to
confirm the incoming trust and then click Next.
14. A success message will appear. Click Finish.
15. A me... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
62 | 2.15. Creating a Transitive Trust Between Two AD Forests
This recipe requires at least the Windows Server 2003 forest functional
level in both forests.
Problem
You want to create a transitive trust between two AD forests. This causes all domains
in both forests to trust each other without the need for additional trusts... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
63 | Using a command-line interface
> netdom trust <Forest1DNSName> /Domain:<Forest2DNSName> /Twoway /Transitive↵
/ADD [/UserD:<Forest2AdminUser> /PasswordD:*]↵
[/UserO:<Forest1AdminUser> /PasswordO:*]
For example, to create a two-way forest trust from the AD forest adatum.com to the AD
forest othercorp.com, use the followi... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
64 | Solution
Using a graphical user interface
1. Open the Active Directory Domains and Trusts snap-in (domain.msc).
2. In the left pane, right-click the forest root domain and select Properties.
3. Click on the Trusts tab.
4. Click the New Trust button. Then click Next.
5. Enter the name of the domain and then click Next.
... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
65 | Discussion
Consider the forest shown in Figure 2-5. It has five domains in a single domain tree.
For authentication requests for Domain 3 to be processed by Domain 5, the request
must traverse the path from Domain 3 to Domain 2 to Domain 1 to Domain 4 to Domain
5. If you create a shortcut trust between Domain 3 and Dom... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
66 | 8. Verify that a two-way trust is selected for the direction of the trust and then click
Next.
9. Enter a complex password for the trust password; click Next. Note that the password
must meet the domain password policy.
10. Review the trust settings summary and then click Next.
11. A success message will appear. Click ... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
67 | Solution
Using a graphical user interface
1. Open the Active Directory Domains and Trusts snap-in (domain.msc).
2. In the left pane, right-click the domain you want to view and select Properties.
3. Click on the Trusts tab.
Using a command-line interface
To enumerate domain trusts using the netdom utility, use the foll... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
68 | Discussion
Using a graphical user interface
You can view the properties of a particular trust by clicking on a trust and clicking the
Properties button.
Using a command-line interface
You can include the /Direct switch with netdom if you want to view only direct-trust
relationships. If you don’t use /Direct, implicit t... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
69 | Solution
Using a graphical user interface
For the Windows Server 2003, Windows Server 2008, and Windows Server 2012 ver‐
sions of the Active Directory Domains and Trusts snap-in:
1. In the left pane, right-click on the trusting domain and select Properties.
2. Click the Trusts tab.
3. Click the domain that is associate... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
70 | 2.20. Resetting a Trust
Problem
You want to reset a trust password. If you’ve determined a trust is broken, you need to
reset it, which will allow users to authenticate across it again.
Solution
Using a graphical user interface
Follow the same directions as in Recipe 2.19. The option to reset the trust will be pre‐
sen... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
71 | Solution
Using a graphical user interface
1. Open the Active Directory Domains and Trusts snap-in (domain.msc).
2. In the left pane, right-click on the trusting domain and select Properties.
3. Click the Trusts tab.
4. Click on the domain that is associated with the trust you want to remove.
5. Click the Remove button.... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
72 | 2.22. Enabling SID Filtering for a Trust
Problem
You want to enable Security Identifier (SID) filtering for a trust. By enabling SID filter‐
ing, you can keep a hacker from spoofing an SID across a trust.
Solution
Using a command-line interface
> netdom trust <TrustingDomain> /Domain:<TrustedDomain> /EnableSIDHistory:N... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
73 | under SP4 or later. You can disable SID filtering by running the netdom command with
the /EnableSIDHistory:Yes switch.
See Also
MS KB 289243 (MS02-001: Forged SID Could Result in Elevated Privileges in Windows
2000)
2.23. Enabling Quarantine for a Trust
Problem
You want to enable Quarantine for a trust. By enabling Qua... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
74 | 2.24. Managing Selective Authentication for a Trust
Problem
You want to enable or disable Selective Authentication for a trust. By enabling Selective
Authentication, you can control which computers—in a trusting domain—users in a
trusted domain can access. Disabling Selective Authentication will allow users in the
trus... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
75 | To grant permissions on individual computers in the trusting domain:
1. Open the Active Directory Users and Computers snap-in (dsa.msc).
2. Right-click on the computer object on which you wish to grant permissions and
select Properties.
3. On the Security tab, select the user or group that you want to authorize, and se... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
76 | 2.25. Finding Duplicate SIDs in a Domain
Problem
You want to find any duplicate SIDs in a domain. Generally, duplicate SIDs in a domain
should not exist, but it is possible in some situations, such as when the relative identifier
(RID) FSMO role owner has to be seized.
Solution
Using a command-line interface
To find du... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
77 | See Also
MS KB 816099 (How to Find and Clean Up Duplicate Security Identifiers with Ntdsutil
in Windows Server 2003)
2.26. Adding Additional Fields to Active Directory Users
and Computers
Problem
You want to add to the list of attributes by which you can search and sort records within
the ADUC (Active Directory Users a... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
78 | Using a command-line interface
First create an LDIF file containing the following information and save it as modi
fy_display_specifiers.ldif:
dn: cn=computer-display,cn=409,cn=DisplaySpecifiers,
cn=Configuration, <ForestRootDN>
changetype: modify
add: attributeDisplayNames
attributeDisplayNames: operatingSystemService... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
79 | null | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
80 | CHAPTER 3
Domain Controllers, Global Catalogs,
and FSMOs
3.0. Introduction
Domain controllers are servers that host an Active Directory domain and provide au‐
thentication and directory services to clients. A domain controller (DC) can only be
authoritative (i.e., it can only process authentication requests) for a sing... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
81 | holders, three for each of the three domains. See Recipe 3.29 for more information on
FSMO roles.
In Windows Server 2008, Microsoft introduced the Read-Only Domain Controller, or
RODC, to improve security for organizations that need to deploy DCs in branch offices
or other remote locations where the physical or logical... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
82 | Domain controllers are also represented by several objects under the Sites container
in the Configuration NC. The Sites container stores objects that are needed to create
a site topology, including site, subnet, sitelink, and server objects. The site topology
is necessary so that domain controllers can replicate data e... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
83 | • Users and computers whose password secrets are permitted to be cached on indi‐
vidual RODCs or on all RODCs in a domain
• Users and computers whose password secrets are never permitted to be cached on
individual RODCs, or on all RODCs in a domain
In order to maintain this information, each RODC contains a number of a... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
84 | 4. Select the desired domain controller options: “Domain Name System (DNS)
server,” “Global Catalog (GC),” and/or “Read only domain controller (RODC).”
5. Type a Directory Services Restore Mode (DSRM) password and then click Next.
6. Select the desired additional options: install from media—if installing from media
—an... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
85 | Solution
1. First, add the Active Directory Domain Services role using Server Manager.
2. Click “Promote this server to a domain controller” in the notification area.
3. Verify that the “Add a domain controller to an existing domain” option is selected.
4. Type the domain name and domain credentials and then click Next... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
86 | 3.3. Performing a Two-Stage RODC Installation
Problem
You want to perform a two-stage promotion of a server to an RODC in a Windows
Server 2012 domain.
This recipe requires that at least one writable Windows Server 2008 or
later domain controller is present in the domain.
Solution
The first stage of the two-stage insta... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
87 | The second stage of the RODC installation will be completed from the console of the
server that is to be configured as an RODC, using the following steps:
1. Click “Promote this server to a domain controller” in the Server Manager notifi‐
cation area and then click Next.
2. Enter the parent domain name and credentials ... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
88 | Solution
Using a graphical user interface
1. Open Active Directory Users and Computers and then select the built-in Domain
Controllers OU.
2. Locate the desired RODC, right-click it, and then click Properties.
3. Select the Password Replication Policy tab.
4. Click Add. Then click the “Allow passwords for the account t... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
89 | — Server operators
• msDS-RevealOnDemandGroup
— Allowed RODC Password Replication Group
When Windows evaluates the Password Replication Policy, a “Deny” setting would
override an “Allow” setting; for example, if a user is a member of two security groups
that are configured with contradictory settings. As with most aspe... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
90 | c. create sysvol full <PathToSaveData>
2. Copy the media from the saved located to the new server that will be promoted.
3. Add the Active Directory Domain Services role. After the role installation, a noti‐
fication will appear within Server Manager.
4. Click Notifications and then click “Promote this server to a doma... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
91 | Be sure that the age of the backup files you are using is significantly less
than your AD forest’s tombstone lifetime. If you install a domain con‐
troller using backup files that are older than the tombstone lifetime
value, you could run into issues with deleted objects being reinjected
into the Active Directory datab... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
92 | 10. Review the options and then click Demote.
Using PowerShell
1. Open PowerShell on the domain controller to be demoted.
2. Run the Uninstall-ADDSDomainController command.
3. Supply a new password for the local Administrator account.
4. Type Y and press Enter to confirm the operation. Note that the server will reboot
... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
93 | Solution
You can automate the promotion of a domain controller by using PowerShell. Use the
Install-ADDSDomainController cmdlet, as shown in the following example:
Import-Module ADDSDeployment
Install-ADDSDomainController↵
-CreateDNSDelegation↵
-Credential (Get-Credential)↵
-CriticalReplicationOnly:$false↵
-DatabasePat... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
94 | logs the information that is displayed as dcpromo progresses. The Dcpromoui.log file is
much more detailed and captures discrete actions that occur during dcpromo process‐
ing, including any user input. A sample dcpromoui.log file might look something like
this:
dcpromoui 404.554 0000 11:09:01.479 opening log file↵
C:... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
95 | 3.9. Verifying the Promotion of a Domain Controller
Problem
You want to verify that a domain controller has been successfully promoted within an
Active Directory domain.
Solution
Using a command-line interface
> dcdiag /test:replications
> dcdiag /s:<DCName> /test:knowsofroleholders
> dcdiag /s:<DCName> /test:fsmocheck... | http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.