Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Analyzing the Administrative Structure
Figure 1.1: A departmental model organization chart
Figure 1.2: The project-based model
Figure 1.3: The product/service-based model
Figure 1.4: Centralized administration with centralized resources
Figure 1.5: The centralized administration/decentralized resources approach
Figure 1.6: The decentralized administration model
Figure 1.7: Hybrid administration model for delegation of remote resources
Figure 1.8: Hybrid administration model for control of corporate standards
Figure 1.9: Outsourced administration model
Figure 1.10: Multiple domains for separation of administrative control
Figure 1.11: Multiple forest structure
Figure 1.12: OUs designed for administrative control
Chapter 2: Determining Business and Technical Requirements
Figure 2.1: A sample network diagram using Visio
Figure 2.2: A sample Connection Type form
Figure 2.3: A sample Subnet Allocation form
Figure 2.4: Nontransitive trust relationships
Figure 2.5: Windows NT 4 domain structure
Figure 2.6: Administrative delegation
Figure 2.7: Windows 2000 Active Directory administration document
Chapter 3: Designing the Active Directory Forest Structure
Figure 3.1: Domain administrative collaboration
Figure 3.2: Forest administrative collaboration
Figure 3.3: Domains built for data or service autonomy
Figure 3.4: Forest designed for isolation
Figure 3.5: Organization-based forest
Figure 3.6: Isolated organization-based forest
Figure 3.7: Resource forest
Figure 3.8: Restricted-access forest
Figure 3.9: Flowchart to determine isolated or autonomous control
Chapter 4: Designing the Active Directory Domain Structure
Figure 4.1: Single domain used for centralized administration/centralized resources
Figure 4.2: Single domain used for centralized administration/decentralized resources
Figure 4.3: Single domain using OUs for decentralized administration
Figure 4.4: Single domain using OUs for hybrid administration
Figure 4.5: Single domain using OUs for outsourced administration
Figure 4.6: Regional domain model
Figure 4.7: Using multiple trees within the forest
Figure 4.8: Trust path within a forest
Figure 4.9: Shortcut trust path
Figure 4.10: Comparison of the Windows NT 4.0 domains and the upgraded Active Directory structure
Figure 4.11: Empty forest root and upgraded MUDs
Figure 4.12: Upgrading Windows NT 4 to Windows 2003 Active Directory
Figure 4.13: Windows NT 4.0 restructure
Chapter 5: Designing an Organizational Unit Structure for Administrative Purposes
Figure 5.1: OU structure based on Location
Figure 5.2: OU structure based on Organization
Figure 5.3: OU structure based on Function
Figure 5.4: OU structure based on Location, then Organization
Figure 5.5: OU structure based on Organization, then Location
Figure 5.6: OU design for administrative purposes
Figure 5.7: OU design with OU created to control visibility
Figure 5.8: The OU structure after top-level OUs have been created
Figure 5.9: The OU structure after permissions have been delegated
Figure 5.10: Migrating NT 4 MUD to OU, keeping the same administrative groups
Chapter 6: Designing Organizational Units for Group Policy
Figure 6.1: The Group Policy tab after the Group Policy Management Console is added.
Figure 6.2: Group Policy Objects within the GPMC
Figure 6.3: Group Policy Modeling
Figure 6.4: WMI filter for detecting adequate drive space
Figure 6.5: OU structure enhanced for Group Policy application
Figure 6.6: Corporate Standards GPO enforced at the domain level
Figure 6.7: Corporate Standards affecting the Accounting OU
Figure 6.8: Priorities for GPOs attached to the Accounting OU
Figure 6.9: Processing order for GPOs at the Accounting OU
Figure 6.10: Delegation tab for an OU
Chapter 7: Designing Accounts Access and Management
Figure 7.1: The Default Domain Policy password policies
Figure 7.2: The Default Domain Policy lockout settings
Figure 7.3: Example of AGLP
Figure 7.4: Example of AGDLP
Figure 7.5: Example of AGUDLP
Figure 7.6: Nesting groups for efficient resource access
Chapter 8: Designing the Site Topology
Figure 8.1: Network map
Figure 8.2: Multiple domain network map
Figure 8.3: Site design layout
Figure 8.4: Determining the nearest site
Figure 8.5: Site design to support application requirements
Figure 8.6: Replication schedules based on site links
Figure 8.7: Site Link Bridge
Chapter 9: Designing Remote Access
Figure 9.1: Network access hierarchy
Figure 9.2: Example of the core tier
Figure 9.3: Example of the distribution tier
Figure 9.4: Example of the access tier
Figure 9.5: Example of the bastion host firewall solution
Figure 9.6: Example of the three- homed firewall solution
Figure 9.7: Example of the back-to-back firewalls solution
Figure 9.8: IP address allocation
Chapter 10: Analyzing Name Resolution
Figure 10.1: Using the same domain name internally and externally
Figure 10.2: Using a separate domain name internally than is used externally
Figure 10.3: DNS server placement to support username resolution queries
Figure 10.4: WINS hub-and-spoke-replication-topology
Figure 10.5: WINS linear replication topology
Figure 10.6: Multi-level WINS hub-and-spoke topology
Figure 10.7: DNS servers in perimeter network
Previous page
Table of content
Next page
MCSE: Windows Server 2003 Active Directory and Network Infrastructure Design Study Guide (70-297)
ISBN: 0782143210
EAN: 2147483647
Year: 2004
Pages: 159
Authors:
Brad Price
,
Sybex
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Designing Forms
Creating Advanced View Selections
Using @Commands in Agents
Real-World Examples Using the Formula Language
Appendix B. Domino URL Reference
Cisco Voice Gateways and Gatekeepers
Implementing SIP Gateways
Review Questions
COR Operation
SRST Overview
DSP Resources
Ruby Cookbook (Cookbooks (OReilly))
Sorting an Array
Searching a Hash with Regular Expressions
Graphing Data
Talking Directly to a PostgreSQL Database
Passing Data from the Controller to the View
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Setting Up a Drawing
Gaining Drawing Strategies: Part 2
Grouping Objects into Blocks
Controlling Text in a Drawing
Dimensioning a Drawing
802.11 Wireless Networks: The Definitive Guide, Second Edition
Fragmentation and Reassembly
1X on Wireless LANs
11i: Robust Security Networks, TKIP, and CCMP
11 Hardware
Using 802.11 on Windows
Extending and Embedding PHP
Summary
Summary
Declaring and Accessing INI Settings
Building and Compiling a Host Application
Execution
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies