ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Mastering Active Directory

دانلود کتاب تسلط بر Active Directory

Mastering Active Directory

مشخصات کتاب

Mastering Active Directory

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 9781787289352 
ناشر: Packt 
سال نشر: 2017 
تعداد صفحات: 0 
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 30 مگابایت 

قیمت کتاب (تومان) : 51,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 13


در صورت تبدیل فایل کتاب Mastering Active Directory به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تسلط بر Active Directory نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تسلط بر Active Directory

با استفاده از Active DirectoryAbout This Book در مدیریت زیرساخت هویت سازمانی استاد شوید* خدمات Active Directory خود را برای Windows Server 2016 به طور موثر مدیریت کنید* وظایف اداری را در Active Directory با استفاده از PowerShell به صورت خودکار مدیریت کنید* شبکه سازمان خود را با سهولت مدیریت کنید. مدیر، مدیر سیستم یا متخصص شبکه که دانش اولیه اکتیو دایرکتوری را دارد و به دنبال کسب تخصص در این موضوع است، این کتاب برای شماست. آنچه خواهید آموخت* ویژگی های جدید Active Directory Domain Service 2016 را بررسی کنید* Automate AD وظایف با PowerShell* با عملکردهای پیشرفته این طرح آشنا شوید* درباره نقش های Flexible Single Master Operation (FSMO) و محل قرارگیری آنها بیاموزید* نصب و انتقال Active Directory از نسخه های قدیمی به Active Directory 2016* مدیریت اشیاء Active Directory با استفاده از ابزارها و تکنیک های مختلف * کاربران، گروه ها و دستگاه ها را به طور موثر مدیریت کنید * ساختار OU خود را به بهترین شکل طراحی کنید * اکتیو دایرکتوری را حسابرسی و نظارت کنید * Azure را با Active Directory برای یک راه اندازی ترکیبی ادغام کنیدIn DetailActive Directory یک سیستم متمرکز و استاندارد است که مدیریت شبکه داده های کاربر را خودکار می کند. امنیت و منابع توزیع شده و امکان همکاری با سایر دایرکتوری ها را فراهم می کند. اگر از اصول اکتیو دایرکتوری آگاه هستید و می خواهید در آن تخصص کسب کنید، این کتاب برای شما عالی است. ما به سرعت معماری و اصول اکتیو دایرکتوری را مرور می کنیم و سپس به اجزای اصلی مانند جنگل ها، دامنه ها، سایت ها، روابط اعتماد، OU، اشیاء، ویژگی ها، DNS و تکرار می پردازیم. سپس به سراغ طرح‌واره‌های AD، کاتالوگ‌های جهانی، LDAP، RODC، RMS، مقامات گواهی‌نامه، خط‌مشی‌های گروه و بهترین شیوه‌های امنیتی می‌رویم که به شما کمک می‌کند درک بهتری از اشیاء و مؤلفه‌ها و نحوه استفاده مؤثر از آنها به دست آورید. ما همچنین خدمات دامنه AD و خدمات فدراسیون برای ویندوز سرور 2016 و تمام ویژگی های جدید آنها را پوشش خواهیم داد. در آخر، یاد خواهید گرفت که چگونه زیرساخت هویت خود را برای راه اندازی ابر ترکیبی مدیریت کنید. همه اینها به شما کمک می کند تا زیرساخت هویت سازمانی خود را به شیوه ای ایمن و موثر طراحی، برنامه ریزی، استقرار، مدیریت عملیات و عیب یابی کنید. علاوه بر این، من شما را از طریق خودکارسازی وظایف اداری با استفاده از cmdlet های PowerShell راهنمایی می کنم. در پایان کتاب، بهترین شیوه‌ها و تکنیک‌های عیب‌یابی را پوشش خواهیم داد که می‌توانند برای بهبود امنیت و عملکرد در زیرساخت‌های هویتی مورد استفاده قرار گیرند. سبک و رویکرد این راهنمای گام به گام به شما کمک می‌کند تا با استفاده از خدمات اکتیو دایرکتوری تسلط پیدا کنید. Microsoft Server 2016 و PowerShell، با بهترین شیوه های دنیای واقعی در پایان.


توضیحاتی درمورد کتاب به خارجی

Become a master at managing enterprise identity infrastructure by leveraging Active DirectoryAbout This Book* Manage your Active Directory services for Windows Server 2016 effectively* Automate administrative tasks in Active Directory using PowerShell* Manage your organization's network with easeWho This Book Is ForIf you are an Active Directory administrator, system administrator, or network professional who has basic knowledge of Active Directory and are looking to gain expertise in this topic, this is the book for you.What You Will Learn* Explore the new features in Active Directory Domain Service 2016* Automate AD tasks with PowerShell* Get to know the advanced functionalities of the schema* Learn about Flexible Single Master Operation (FSMO) roles and their placement* Install and migrate Active directory from older versions to Active Directory 2016* Manage Active Directory objects using different tools and techniques* Manage users, groups, and devices effectively* Design your OU structure in the best way* Audit and monitor Active Directory* Integrate Azure with Active Directory for a hybrid setupIn DetailActive Directory is a centralized and standardized system that automates networked management of user data, security, and distributed resources and enables interoperation with other directories. If you are aware of Active Directory basics and want to gain expertise in it, this book is perfect for you. We will quickly go through the architecture and fundamentals of Active Directory and then dive deep into the core components, such as forests, domains, sites, trust relationships, OU, objects, attributes, DNS, and replication. We will then move on to AD schemas, global catalogs, LDAP, RODC, RMS, certificate authorities, group policies, and security best practices, which will help you gain a better understanding of objects and components and how they can be used effectively. We will also cover AD Domain Services and Federation Services for Windows Server 2016 and all their new features. Last but not least, you will learn how to manage your identity infrastructure for a hybrid-cloud setup. All this will help you design, plan, deploy, manage operations on, and troubleshoot your enterprise identity infrastructure in a secure, effective manner. Furthermore, I will guide you through automating administrative tasks using PowerShell cmdlets. Toward the end of the book, we will cover best practices and troubleshooting techniques that can be used to improve security and performance in an identity infrastructure.Style and approachThis step-by-step guide will help you master the core functionalities of Active Directory services using Microsoft Server 2016 and PowerShell, with real-world best practices at the end.



فهرست مطالب

Cover
Copyright
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Customer Feedback
Table of Contents
Preface
Chapter 1: Active Directory Fundamentals
	Benefits of using Active Directory
		Centralized data repository
		Replication of data
		High availability
		Security
		Auditing capabilities
		Single sign-on
		Schema modification
		Querying and indexing
	Active Directory components
		Logical components
			Forests
			Domains
			Domain trees
			Organizational units
		Physical components
			Domain controllers
			Global catalog server
			Active Directory sites
	Active Directory objects
		Globally unique identifier and security identifier
		Distinguished names
	Active Directory server roles
		Active Directory Domain Service
			Read-only domain controllers
		Active Directory Federation Services
		Active Directory Lightweight Directory Services
		Active Directory Rights Management Services
		Active Directory Certification Services
	Summary
Chapter 2: Active Directory Domain Services 2016
	AD DS 2016 features
		Deprecation of Windows Server 2003 domain and forest functional levels
		Deprecation of File Replication Services
	Privileged Access Management
		What is it to do with AD DS 2016?
			What is the logic behind PAM?
	Time-based group memberships
	Microsoft Passport
	Active Directory Federation Services improvements
	Time sync improvements
	Summary
Chapter 3: Designing Active Directory Infrastructure
	What makes a good system?
		New business requirements
		Correcting legacy design mistakes
	Gathering business data
		Defining security boundaries
		Identifying the physical computer network structure
	Designing the forest structure
		Single forest
		Multiple forest
		Creating the forest structure
			Autonomy
			Isolation
		Selecting forest design models
			Organizational forest model
			Resource forest model
			Restricted access forest model
	Designing the domain structure
		Single domain model
		Regional domain model
		The number of domains
		Deciding domain names
		Forest root domain
		Deciding domain and forest functional levels
	Designing the OU structure
	Designing the physical topology of Active Directory
		Physical or virtual domain controllers
		Domain controller placement
	Global catalog server placement
	Summary
Chapter 4: Active Directory Domain Name System
	What is DNS?
	Hierarchical naming structure
	How DNS works
	DNS essentials
		DNS records
			Start of authority record
			A and AAAA records
			NS records
			MX records
			Canonical name record
			PTR record
			SRV records
		Zones
			Primary zone
			Secondary zone
			Stub zone
			Reverse lookup zone
			DNS server operation modes
			Zone transfers
		DNS delegation
	Summary
Chapter 5: Placing Operations Master Roles
	FSMO roles
		Schema operations master
		Domain naming operations master
		Primary domain controller emulator operations master
		Relative ID operations master role
		Infrastructure operations master
	FSMO roles placement
		Active Directory logical and physical topology
		Connectivity
		The number of domain controllers
		Capacity
	Moving FSMO roles
	Seize FSMO roles
	Summary
Chapter 6: Migrating to Active Directory 2016
	Active Directory Domain Service installation prerequisites
		Hardware requirements
		Virtualized environment requirements
		Additional requirements
		Active Directory Domain Service installation methods
	Active Directory Domain Service deployment scenarios
		Setting up a new forest root domain
			Active Directory Domain Service installation checklist for first domain controller
			Design topology
			Installation steps
		Setting up an additional domain controller
			Active Directory Domain Service installation checklist for an additional domain controller
			Design topology
			Installation steps
		Setting up a new domain tree
			Active Directory Domain Service installation checklist for a new domain tree
			Design topology
			Installation steps
		Setting up a new child domain
			Active Directory Domain Service installation checklist for a new child domain
			Design topology
			Installation steps
	How to plan Active Directory migrations
		Migration life cycle
			Audit
				Active Directory logical and physical topology
				Active Directory health check
				System Center Operation Manager and Operation Management Suite
				Active Directory health checklist
				Application audit
			Plan
			Implementation
				Active Directory migration checklist
				Design topology
				Installation steps
				Verification
			Maintain
	Summary
Chapter 7: Managing Active Directory Objects
	Tools and methods to manage objects
		Active Directory Administrative Center
		The Active Directory Users and Computers MMC
		Active Directory object administration with PowerShell
	Creating, modifying, and removing objects in Active Directory
		Creating Active Directory objects
			Creating user objects
			Creating computer objects
		Modifying Active Directory objects
		Removing Active Directory objects
	Finding objects in Active Directory
		Finding objects using PowerShell
	Summary
Chapter 8: Managing Users, Groups, and Devices
	Object attributes
		Custom attributes
	User accounts
		Managed Service Accounts
		Group Managed Service Accounts
			Uninstalling Managed Service Account
	Groups
		Group scope
			Converting groups
			Setting up groups
	Devices and other objects
	Best practices
	Summary
Chapter 9: Designing the OU Structure
	OUs in operations
		Organizing objects
		Delegating control
		Group policies
		Containers versus OUs
	OU design models
		The container model
		The object type model
		The geographical model
		The department model
	Managing the OU structure
		Delegating control
	Summary
Chapter 10: Managing Group Policies
	Benefits of group policies
		Maintaining standards
		Automating administration tasks
		Preventing users from changing system settings
		Flexible targeting
		No modifications to target
	Group Policy capabilities
	Group Policy objects
		Group Policy container
		The Group Policy template
	Group Policy processing
	Group Policy inheritance
	Group Policy conflicts
	Group Policy mapping and status
		Administrative templates
	Group Policy filtering
		Security filtering
		WMI filtering
	Group Policy preferences
	Item-level targeting
	Loopback processing
	Group Policy best practices
	Summary
Chapter 11: Active Directory Services
	The AD LDS overview
		Where to use LDS?
			Application developments
			Hosted applications
			Distributed data stores for Active Directory integrated applications
			Migrating from other directory services
		The LDS installation
	The Active Directory replication
		FRS versus DFSR
			Prepared state
			Redirected state
			Eliminated state
	Active Directory sites and replication
		Replication
		Authentication
		Service locations
	Sites
		Subnets
		Site links
		Site link bridges
	Managing Active Directory sites and other components
		Managing sites
		Managing site links
			The site cost
			Inter-site transport protocols
			Replication intervals
			Replication schedules
			Site link bridge
			Bridgehead servers
			Managing subnets
	How does replication work?
		Intra-site replications
		Inter-site replications
		Knowledge Consistency Checker
		How update occurs ?
			The update sequence number
			Directory Service Agent GUID and invocation ID
			The high watermark vector table
			The up-to-dateness vector table
	The read-only domain controllers
	Active Directory database maintenance
		The ntds.dit file
		The edb.log file
		The edb.chk file
		The temp.edb file
		Offline defragmentation
	Active Directory backup and recovery
		Preventing accidental deletion of objects
		Active Directory Recycle Bin
		Active Directory snapshots
		Active Directory system state backup
		Active Directory recovery from system state backup
	Summary
Chapter 12: Active Directory Certificate Services
	PKI in action
		Symmetric keys versus asymmetric keys
		Digital encryption
		Digital signatures
		Signing, encryption, and decryption
		Secure Sockets Layer certificates
			Types of certification authorities
			How do certificates work with digital signatures and encryption?
			What can we do with certificates?
			Active Directory Certificate Service components
				The certification authority
				Certificate Enrollment Web Service
				Certificate Enrollment Policy Web Service
				Certification Authority Web Enrollment
				Network Device Enrollment Service
				Online Responder
				The types of CA
	Planning PKI
		Internal or public CAs
		Identifying the object types
		Cryptographic provider
		The cryptography key length
		Hash algorithms
		The certificate validity period
		The CA hierarchy
		High availability
		Deciding certificate templates
		The CA boundary
	PKI deployment models
		The single-tier model
		The two-tier model
		Three-tier models
	Setting up PKI
		Setting up a stand-alone root CA
			DSConfigDN
			CDP locations
			AIA locations
			CA time limits
			CRL time limits
			The new CRL
		Publishing the root CA data into the Active Directory
		Setting up the issuing CA
		Issuing a certificate for the issuing CA
		Post configuration tasks
			CDP locations
			AIA locations
			CA and CRL time limits
		Certificate templates
		Requesting certificates
	Summary
Chapter 13: Active Directory Federation Services
	How does AD FS work?
		Security Assertion Markup Language (SAML)
		WS-Trust
		WS-Federation
	AD FS components
		Federation Service
			AD FS 1.0
			AD FS 1.1
			AD FS 2.0
			AD FS 2.1
			AD FS 3.0
			AD FS 4.0
		The Web Application Proxy
		AD FS configuration database
	AD FS deployment topologies
		Single Federation Server
		Single federation server and single Web Application Proxy server
		Multiple federation servers and multiple Web Application Proxy servers with SQL Server
	AD FS deployment
		DNS records
		SSL certificates
		Installing the AD FS role
		Installing WAP
		Configuring the claim aware app with new federation servers
		Creating a relaying party trust
		Configuring the Web Application Proxy
	Integrating with Azure MFA
		Prerequisites
		Creating a certificate in an AD FS farm to connect to Azure MFA
		Enabling AD FS servers to connect with Azure Multi-Factor Auth Client
		Enabling AD FS farm to use Azure MFA
		Enabling Azure MFA for authentication
	Summary
Chapter 14: Active Directory Rights Management Services
	What is AD RMS?
	AD RMS components
		Active Directory Domain Services
			The AD RMS cluster
			Web server
			SQL Server
			AD RMS client
			Active Directory Certificate Service
	How does AD RMS work?
	AD RMS deployment
		Single forest – single cluster
		Single forest – multiple clusters
		AD RMS in multiple forests
		AD RMS with AD FS
	AD RMS configuration
		Setting up AD RMS root cluster
		Installing the AD RMS role
		Configuring the AD RMS role
		Testing by protecting data using the AD RMS cluster
		To protect the document
	Summary
Chapter 15: Active Directory Security Best Practices
	Active Directory authentication
	Delegating permissions
		Predefined Active Directory administrator roles
		Using object ACLs
		Using the delegate control method in AD
	Fine-grained password policies
		Limitations
		Resultant Set of Policy
		Configuration
	Pass-the-hash attacks
		Protected Users security group
		Restricted admin mode for RDP
		Authentication policies and authentication policy silos
			Authentication policies
			Authentication policy silos
			Creating authentication policies
			Creating authentication policy silos
	Just-in-time administration and just enough administration
		Just-in-time administration
		Just enough administration
	Summary
Chapter 16: Advanced AD Management with PowerShell
	AD management with PowerShell – preparation
		AD management commands and scripts
			Replication
			Replicating a specific object
		User and Groups
			Last log on time
			Last log in date report
			Login failures report
			Finding the locked out account
			Password expire report
		JEA
			JEA configuration
			Testing
		Summary
Chapter 17: Azure Active Directory Hybrid Setup
	What is Azure AD?
		Benefits of Azure AD
		Azure AD limitations
		Azure AD editions
			Azure AD free version
			Azure AD Basic
			Azure AD Premium P1
			Azure AD Premium P2
	Integrate Azure AD with on-premises AD
		Azure AD Connect
		Azure AD Connect deployment topology
			Staging server
			Before installing the AD Connect server
	Step-by-step guide to integrate on-premises AD environment with Azure AD
		Creating a virtual network
		Creating an Azure AD instance
		Add DNS server details to the virtual network
		Create an AAD DC administrator group
		Creating a global administrator account for Azure AD Connect
		Add a custom domain to Azure AD
		Setting up Azure AD Connect
		Password synchronization
			Syncing NTLM and Kerberos credential hashes to Azure AD
	Manage Azure AD Domain Services using virtual server
		Creating virtual server in Azure in same virtual network
		Join virtual server to Azure AD
		Install RSAT tools and managing Azure AD through a virtual server
	Summary
Chapter 18: Active Directory Audit and Monitoring
	Auditing and monitoring Active Directory using inbuilt Windows tools and techniques
		Windows Event Viewer
			Custom views
			Windows logs
			Applications and Services logs
			Subscriptions
			Active Directory Domain Service event logs
			Active Directory Domain Service log files
	Active Directory audit
		Audit Directory Service Access
		Audit Directory Service Changes
		Audit Directory Service Replication
		Audit Detailed Directory Service Replication
	Demonstration
		Reviewing events
		Setting up event subscriptions
		Security event log from domain controllers
		Enabling advanced security audit policies
		Enforcing advanced auditing
		Reviewing events with PowerShell
	Microsoft Advanced Threat Analytics
		ATA benefits
		ATA components
			ATA center
			ATA gateway
			ATA Lightweight Gateway
		ATA deployments
			ATA deployment prerequisites
	Demonstration
		Installing ATA center
		Installing ATA Lightweight Gateway
		ATA testing
	Microsoft Operations Management Suite (OMS)
		Benefits of OMS
		OMS services
		OMS in a hybrid environment
		What benefits will it have for Active Directory?
	Demonstration
		Enabling OMS AD solutions
		Installing OMS agents
		Viewing analyzed data
		Collecting Windows logs for analysis
	Summary
Chapter 19: Active Directory Troubleshooting
	How to troubleshoot AD DS replication issues
		Identifying replication issues
		Event Viewer
			System Center Operation Manager
			Microsoft Operation Management Suite (OMS)
	Troubleshooting replication issues
		Lingering objects
			Strict replication consistency
		Removing lingering objects
	DFS replication issues
		Troubleshooting
			Verifying the connection
			SYSVOL share status
			DFS replication status
			DFSR crash due to dirty shutdown of the domain controller (event ID 2213)
			Content freshness
			Non-authoritative DFS replication
			Authoritative DFS replication
	How to troubleshoot Group Policy issues
		Troubleshooting
			Forcing Group Policy processing
			Resultant Set of Policy (RSoP)
			GPRESULT
			Group Policy Results Wizard
			Group Policy Modeling Wizard
	How to troubleshoot AD DS database-related issues
		Integrity checking to detect low-level database corruption
		AD database recovery
	Summary
Index




نظرات کاربران