+ All Categories
Home > Documents > Module 3

Module 3

Date post: 22-Feb-2016
Category:
Upload: jody
View: 79 times
Download: 1 times
Share this document with a friend
Description:
Module 3. Managing Active Directory Domain Services Objects. Module Overview. Managing User AccountsManaging Group AccountsManaging Computer AccountsDelegating Administration. Lesson 1: Managing User Accounts. - PowerPoint PPT Presentation
Popular Tags:
29
Microsoft ® Official Course Module 3 Managing Active Directory Domain Services Objects
Transcript
Page 1: Module 3

Microsoft® Official Course

Module 3

Managing Active Directory Domain Services Objects

Page 2: Module 3

Module Overview

Managing User AccountsManaging Group AccountsManaging Computer Accounts•Delegating Administration

Page 3: Module 3

Lesson 1: Managing User Accounts

AD DS Administration ToolsCreating User AccountsConfiguring User Account AttributesCreating User Profiles•Demonstration: Managing User Accounts

Page 4: Module 3

AD DS Administration Tools

To manage AD DS objects, you can use the following graphical tools:

You can also use the following command-line tools:

• Active Directory Administration snap-ins

• Active Directory Administrative Center

• Active Directory module in Windows PowerShell• Directory Service commands

Page 5: Module 3

Creating User Accounts

Page 6: Module 3

Configuring User Account Attributes

Page 7: Module 3

Creating User Profiles

Page 8: Module 3

Demonstration: Managing User Accounts

In this demonstration, you will see how to:•Open the Active Directory Administrative Center• Delete a user account• Create a new user account•Move the user account

Page 9: Module 3

Lesson 2: Managing Group Accounts

Group TypesGroup ScopesImplementing Group ManagementDefault GroupsSpecial Identities•Demonstration: Managing Groups

Page 10: Module 3

Group Types

•Distribution groups• Used only with email applications• Not security-enabled (no SID); cannot be given permissions

•Security groups• Security principal with an SID;

can be given permissions• Can also be email-enabled

Page 11: Module 3

Group Scopes

U UserC ComputerGG Global Group

DLG Domain Local GroupUG Universal Group

Group scope

Members from same domain

Members from

domain in same forest

Members from

trusted external domain

Can beassigned

permissions to resources

Local U, C,GG, DLG, UGand local users

U, C,GG, UG

U, C,GG

On the local computer only

Domain Local

U, C,GG, DLG, UG

U, C,GG, UG

U, C,GG

Anywhere in the domain

Universal U, C,GG, UG

U, C,GG, UG

N/A Anywhere in the forest

Global U, C,GG

N/A N/A Anywhere in the domain or a trusted domain

Page 12: Module 3

Implementing Group Management

ACL_Sales_Read(Domain Local Group)

Domain local groupsWhich provide management such as resource access,

DL

which are

Sales(Global Group)

Auditors(Global Group)

In a multi domain forest, it is IGUDLA, where U is Universal

Assigned access to a resource

A

IdentitiesUsers or computers,

I

which are members ofGlobal groupsWhich collect members based on members’ roles,

G

which are members of

Page 13: Module 3

Default Groups

• Carefully manage the default groups that provide administrative privileges, because these groups:• Typically have broader privileges than are necessary for most delegated environments• Often apply protection to their membersGroup LocationEnterprise Admins Users container of the forest root domainSchema Admins Users container of the forest root domainAdministrators Built-in container of each domain Domain Admins Users container of each domain Server Operators Built-in container of each domain Account Operators Built-in container of each domain Backup Operators Built-in container of each domain Print Operators Built-in container of each domain

Page 14: Module 3

Special Identities• Special identities:• Are groups for which membership is controlled by the operating system• Can be used by the Windows Server operating system to provide access to resources:• Based on the type of authentication or connection• Not based on the user account

• Important special identities include:• Anonymous Logon• Authenticated Users• Everyone• Interactive• Network• Creator owner

Page 15: Module 3

Demonstration: Managing Groups

In this demonstration, you will see how to:• Create a new group• Add members to the group• Add a user to the group• Change the group type and scope•Modifying the group’s Managed By property

Page 16: Module 3

Lesson 3: Managing Computer Accounts

What Is the Computers Container?Specifying the Location of Computer AccountsControlling Permissions to Create Computer AccountsComputer Accounts and Secure Channels•Resetting the Secure Channel

Page 17: Module 3

What Is the Computers Container?

Page 18: Module 3

Specifying the Location of Computer Accounts• Best practice is to create OUs for computer objects• Servers

• Typically subdivided by server role

• Client computers• Typically subdivided by region

• Divide OUs:• By administration• To facilitate configuration with Group Policy

Page 19: Module 3

Controlling Permissions to Create Computer Accounts

Page 20: Module 3

Computer Accounts and Secure Channels

• Computers have accounts• sAMAccountName and password• Used to create a secure channel between the computer and a domain controller

• Scenarios where a secure channel can be broken• Reinstalling a computer, even with same name, generates a new SID and password

• Restoring a computer from an old backup, or rolling back a computer to an old snapshot

• Computer and domain disagree about what the password is

Page 21: Module 3

Resetting the Secure Channel

•Do not remove a computer from the domain and rejoin• This process creates a new account, resulting in new SID and lost group memberships

•Options for resetting the secure channel:• Active Directory Users and Computers• DSMod.exe• NetDom.exe• NLTest.exe• Windows PowerShell

Page 22: Module 3

Lesson 4: Delegating Administration

AD DS PermissionsEffective AD DS Permissions•Demonstration: Delegating Administrative Control

Page 23: Module 3

AD DS Permissions

Page 24: Module 3

Effective AD DS PermissionsPermissions assigned to users and groups accumulateBest practice is to assign permissions to groups, not to individual usersIn the event of conflicts:

To evaluate effective permissions, you can use:

• Deny permissions override Allow permissions• Explicit permissions override Inherited

permissions• Explicit Allow overrides Inherited Deny

• The Effective Permissions tab• Manual analysis

Page 25: Module 3

Demonstration: Delegating Administrative ControlIn this demonstration, you will see how to:• Delegate a standard task• Delegate a custom task• View AD DS permissions resulting from these

delegations

Page 26: Module 3

Lab: Managing Active Directory Domain Services ObjectsExercise 1: Delegating Administration for a Branch OfficeExercise 2: Creating and Configuring User Accounts in AD DS• Exercise 3: Managing Computer Objects in AD DS

Logon InformationVirtual Machines 20410B-LON-DC1

20410B-LON-CL1User name Adatum\AdministratorPassword Pa$$w0rdEstimated Time: 60 minutes

Page 27: Module 3

Lab Scenario

A. Datum Corporation is a global engineering and manufacturing company with a head office based in London, England. An IT office and a data center are located in London to support the London office and other locations. A. Datum has recently deployed a Windows Server 2012 infrastructure with Windows 8 clients.You have been working for A. Datum as a desktop support specialist and have visited desktop computers to troubleshoot application and network problems. You have recently accepted a promotion to the server support team. One of your first assignments is configuring the infrastructure service for a new branch office.To begin deployment of the new branch office, you are preparing AD DS objects. As part of this preparation, you need to create an OU for the branch office and delegate permission to manage it. Then you need to create users and groups for the new branch office. Finally, you need to reset the secure channel for a computer account that has lost connectivity to the domain in the branch office.

Page 28: Module 3

Lab Review

What are the options for modifying the attributes of new and existing users?What types of objects can be members of global groups?What types of objects can be members of domain local groups?•What are the two credentials that are necessary for any computer to join a domain?

Page 29: Module 3

Module Review and Takeaways

Review QuestionsTools•Best Practices


Recommended