AD DS
Install
Administration
Snap-ins
Objects
Users
Creation
Supporting
Groups
Creation
Managing
Administration
Computers
Creation
Supporting
Group policies
Infrastructure
Implementation
Manage scope
Links
Inheritance/precedence
Security filtering
WMI Filtering
Node enabling
Preference targeting
Processing
Loopback processing
Supporting
Settings
Delegation
Security
Software distribution
Auditing
Authentication
Password policies
Fine-grained (2008 domain)
PSO (password settings objects)
Precedence (1 highest)
Resultant PSO
Use ADSIEdit
Applies to users and groups
Default Domain Policy
Applies to whole domain
Lockout policies
Auditing
Events
Account logon
Logon
GPO
RODC
AD+DNS
Concepts
IP V4
IP V6
PNRP
Split-brain
Domain Controllers
Installation
Operations Masters
Schema master
Domain naming master
Pdc
Rid master
Infrastructure master
DFS Replication
Functional level 2008
Dfsmig.exe
Sites & Replication
Sites
Subnets
Global catalog
Universal Group Membership Caching (UGMC)
Application directory partitions
Application partitions
Directory partitions
Schema
Configuration
Domain
Replication
Connection objects
Pull technology
Knowledge consistency checker (KCC)
Domains & forests
Functional levels
Domains & Trusts
Business continuity
Proactive maintenance
Datastore protection
Proactive directory performance management
AD FS
Firewall
Concept
Authentication process
Designs
Deployments
Use + Manage
AD RMS
Components
AD DS
Authentication
AD CS
PKI
AD FS
External partners
SQL Server
Datastore
AD RMS Enabled applications
Configure
Creating rights policy templates
Implementation
1- internal use of intellectual property
2-sharing content with partners
3- outside network
Install
Root cluster (Forest-wide)
Certification requedts
Licensing requests
Licensing-only clusters
AD CS + PKI
Scenarios
EFS- encrypt all data files
SSTP- encrypt all remote communications
S/MIME- secure email
Secure logons
Secure web sites
NAP- secure servers
Secure wireless communications
AD RMS- protect data
Components
CA- Certificates authorities
Type
Standalone
Workgroup / no AD DS
Internal root CA
Take offline after use
Manual certificate issuing/approval
Standard template
Enterprise
AD DS integrated
Issuing CA
Always online
Automatic issue & approve
Encryption keys protected
Only version enterprise / datacenter
CA Web Enrollment
Request cert thru web browser
Smart card enrollment
Obtain cert revocation list (CRL)
Online Responder (OR)
Respond to cert validation requests
Network device enrolment service (NDES)
Add network device to PKI
Planning
CA Hierarchy
Single tier
2 tier
3 tier
Certificate enrolment support
Request
Validation
Distribution
Certificate renewal support
Lifetimes
Key pairs
Public
Private
CPS (certificate practice statement)
Policies
Issuing
Revocation
Installing
Server version
Standalone
Configure
Revocation
Specify CRL Distribution Point
CA Console
CRL and Delta CRL Overlap period
Certutil.exe
Schedule CRL publication
Certificate template
Enterprise
Version2
Version3
Configure
EFS
Request handling
Archive subject encryption private key
Recovery agent template
Wireless network
Network policy server template
IAS
RAS
Publish to AD
Smart card logons
Smartcard logon template
Smartcard user template
Smartcard enrollment
Web server / DC
Web server template
DC Authentication template
Deploy / issue
AD CS
AD CS Console
Autoenrollment
GPO
Public key policies
Computer
User
Online Responder
OCSP Response signing certificate
Authority information access extension
Protection
Backup
NDES
CertUtil.exe
Enterprise PKI
AD LDS
Create instance
Configuring
Scenarios
Application LDAP
Extension to AD DS schema
Provide authentication on perimeter network
Consolidate identity repository
Support department app
Distributed application
Migrate legacy LDAP App
Local development
Prevent AD DS Schema modification