Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Analyzing the Administrative Structure
Figure 1.1: A departmental model organization chart
Figure 1.2: The project-based model
Figure 1.3: The product/service-based model
Figure 1.4: Centralized administration with centralized resources
Figure 1.5: The centralized administration/decentralized resources approach
Figure 1.6: The decentralized administration model
Figure 1.7: Hybrid administration model for delegation of remote resources
Figure 1.8: Hybrid administration model for control of corporate standards
Figure 1.9: Outsourced administration model
Figure 1.10: Multiple domains for separation of administrative control
Figure 1.11: Multiple forest structure
Figure 1.12: OUs designed for administrative control
Chapter 2: Determining Business and Technical Requirements
Figure 2.1: A sample network diagram using Visio
Figure 2.2: A sample Connection Type form
Figure 2.3: A sample Subnet Allocation form
Figure 2.4: Nontransitive trust relationships
Figure 2.5: Windows NT 4 domain structure
Figure 2.6: Administrative delegation
Figure 2.7: Windows 2000 Active Directory administration document
Chapter 3: Designing the Active Directory Forest Structure
Figure 3.1: Domain administrative collaboration
Figure 3.2: Forest administrative collaboration
Figure 3.3: Domains built for data or service autonomy
Figure 3.4: Forest designed for isolation
Figure 3.5: Organization-based forest
Figure 3.6: Isolated organization-based forest
Figure 3.7: Resource forest
Figure 3.8: Restricted-access forest
Figure 3.9: Flowchart to determine isolated or autonomous control
Chapter 4: Designing the Active Directory Domain Structure
Figure 4.1: Single domain used for centralized administration/centralized resources
Figure 4.2: Single domain used for centralized administration/decentralized resources
Figure 4.3: Single domain using OUs for decentralized administration
Figure 4.4: Single domain using OUs for hybrid administration
Figure 4.5: Single domain using OUs for outsourced administration
Figure 4.6: Regional domain model
Figure 4.7: Using multiple trees within the forest
Figure 4.8: Trust path within a forest
Figure 4.9: Shortcut trust path
Figure 4.10: Comparison of the Windows NT 4.0 domains and the upgraded Active Directory structure
Figure 4.11: Empty forest root and upgraded MUDs
Figure 4.12: Upgrading Windows NT 4 to Windows 2003 Active Directory
Figure 4.13: Windows NT 4.0 restructure
Chapter 5: Designing an Organizational Unit Structure for Administrative Purposes
Figure 5.1: OU structure based on Location
Figure 5.2: OU structure based on Organization
Figure 5.3: OU structure based on Function
Figure 5.4: OU structure based on Location, then Organization
Figure 5.5: OU structure based on Organization, then Location
Figure 5.6: OU design for administrative purposes
Figure 5.7: OU design with OU created to control visibility
Figure 5.8: The OU structure after top-level OUs have been created
Figure 5.9: The OU structure after permissions have been delegated
Figure 5.10: Migrating NT 4 MUD to OU, keeping the same administrative groups
Chapter 6: Designing Organizational Units for Group Policy
Figure 6.1: The Group Policy tab after the Group Policy Management Console is added.
Figure 6.2: Group Policy Objects within the GPMC
Figure 6.3: Group Policy Modeling
Figure 6.4: WMI filter for detecting adequate drive space
Figure 6.5: OU structure enhanced for Group Policy application
Figure 6.6: Corporate Standards GPO enforced at the domain level
Figure 6.7: Corporate Standards affecting the Accounting OU
Figure 6.8: Priorities for GPOs attached to the Accounting OU
Figure 6.9: Processing order for GPOs at the Accounting OU
Figure 6.10: Delegation tab for an OU
Chapter 7: Designing Accounts Access and Management
Figure 7.1: The Default Domain Policy password policies
Figure 7.2: The Default Domain Policy lockout settings
Figure 7.3: Example of AGLP
Figure 7.4: Example of AGDLP
Figure 7.5: Example of AGUDLP
Figure 7.6: Nesting groups for efficient resource access
Chapter 8: Designing the Site Topology
Figure 8.1: Network map
Figure 8.2: Multiple domain network map
Figure 8.3: Site design layout
Figure 8.4: Determining the nearest site
Figure 8.5: Site design to support application requirements
Figure 8.6: Replication schedules based on site links
Figure 8.7: Site Link Bridge
Chapter 9: Designing Remote Access
Figure 9.1: Network access hierarchy
Figure 9.2: Example of the core tier
Figure 9.3: Example of the distribution tier
Figure 9.4: Example of the access tier
Figure 9.5: Example of the bastion host firewall solution
Figure 9.6: Example of the three- homed firewall solution
Figure 9.7: Example of the back-to-back firewalls solution
Figure 9.8: IP address allocation
Chapter 10: Analyzing Name Resolution
Figure 10.1: Using the same domain name internally and externally
Figure 10.2: Using a separate domain name internally than is used externally
Figure 10.3: DNS server placement to support username resolution queries
Figure 10.4: WINS hub-and-spoke-replication-topology
Figure 10.5: WINS linear replication topology
Figure 10.6: Multi-level WINS hub-and-spoke topology
Figure 10.7: DNS servers in perimeter network
Previous page
Table of content
Next page
MCSE: Windows Server 2003 Active Directory and Network Infrastructure Design Study Guide (70-297)
ISBN: 0782143210
EAN: 2147483647
Year: 2004
Pages: 159
Authors:
Brad Price
,
Sybex
BUY ON AMAZON
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Managing IT Functions
Governance in IT Outsourcing Partnerships
Governance Structures for IT in the Health Care Industry
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 3 Preventive Maintenance
Domain 5 Printers
Domain 1 Operating System Fundamentals
Domain 3 Diagnosing and Troubleshooting
Java How to Program (6th Edition) (How to Program (Deitel))
Terminology
Decision Making: Equality and Relational Operators
(Optional) GUI and Graphics Case Study: Drawing Rectangles and Ovals
Notes on Declaring and Using Methods
Displaying Text and Images in a Window
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Four Precall Planning and Research
Chapter Twelve Controlling the Buying Process
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Appendix A Value Justification Example
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Tcpdump
IDS and IPS Architecture
Cisco Secure IDS
Data Correlation
Security Business Issues
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 1. Set Up Bluetooth on Linux
Hack 25. Detect Networks with Handheld PCs
Hack 83. Make a Deep Dish Cylindrical Parabolic Reflector
Hack 84. Spider Omni Antenna
Section B.1. Microwave Cabling
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies