This document provides an overview of an Active Directory fundamentals training course. It covers Active Directory logical concepts like domains, trees and forests. It also covers physical concepts such as domain controllers, sites and replication. The training will demonstrate Active Directory Domain Name System (DNS) configuration, replication details and how operations masters work. It aims to provide both conceptual knowledge and practical demonstrations of Active Directory administration.
This document provides an overview of Active Directory fundamentals, including logical and physical concepts. It discusses domains, trees, forests, organizational units, domain controllers, sites, site topology, global catalogs, and the domain naming service (DNS). Key points covered include boundaries of security, replication, and administration for domains; transitive trust relationships and shared components for trees and forests; and the purpose and usage of sites, site links, and global catalogs.
The document introduces the DNS system by explaining its purpose of mapping names to resources for easier lookup than numbers. It describes DNS features like global distribution, loose coherency, scalability, reliability, and dynamic updates. Key concepts are explained such as hierarchical DNS names, domains and delegation of subdomains, authoritative and recursive name servers, resource records including SOA and NS records, and how TTL and zone refresh timers maintain consistency.
This document summarizes a presentation about DNS (Domain Name System) for developers. It discusses the basics of how DNS works to map domain names to IP addresses, different DNS record types like A, CNAME, and MX records, DNS zones, security considerations like cache poisoning and DNSSEC, using DNS for failover, load balancing, and CDNs, storing configuration data and doing service discovery in DNS, and some unconventional uses of DNS like tunneling HTTP and IP traffic over DNS. The presentation provides examples and demonstrations of these DNS concepts and techniques.
We browse the Internet. We host our applications on a server or a cloud that is hooked up with a nice domain name. That’s all there is to know about DNS, right? This talk is a refresher about how DNS works. How we can use it and how it can affect availability of our applications. How we can use it as a means of configuring our application components. How this old geezer protocol is a resilient, distributed system that is used by every Internet user in the world. How we can use it for things that it wasn’t built for. Come join me on this journey through the innards of the web!
This document contains information about Justin Smestad and MongoDB. It includes Justin's contact information and background working as a software engineer with skills in Ruby, JavaScript, Clojure, and passion for DevOps. It also provides an overview of MongoDB, describing it as a scalable, high-performance, open source, schema-free, document-oriented database. Key features of MongoDB like indexing, master-slave replication, and horizontal scaling with replica sets and sharding are summarized.
A directory service stores and organizes information about a computer network's users and resources. Active Directory is Microsoft's implementation of an LDAP directory service that allows administrators to define and manage objects like users, printers, and servers across an organization. It provides authentication, authorization, and other services to users and applications. Active Directory replicates information across domain controllers to provide redundancy and high availability.
Cosmos DB is Microsoft's flagship Serverless database service in the Azure cloud. This slide-deck, presented at the Nashville Azure Meetup event on 09/20/2018 covers the why and what of Cosmos DB was is meant to be a good segue into further detailed and advanced topics. The slide-deck presents 3 use-cases for using Cosmos DB in E-Commerce, Healthcare, and IoT. Stay Tuned!
Overview of Netflix edge architecture, the DNS portability problem, and Denominator. Contains a sidebar on Square Dagger.
Some slides lifted from adrianco's dystopian deck.
The event, held on 27th April 2019, was part of the Global Azure Bootcamp and covered Microsoft's Cosmos DB, more specifically:
- Introduction to Cosmos DB, its features, internals, resource models, and request units.
- DEMO: Create an SQL API. Download sample .NET app. Simple queries.
- Covered Change Feed and showcased various use case scenarios.
- Detailed Global Distribution and Consistency Models implications.
- DEMO: Mongo - Lift and shift. Run simple .NET code against a MongoDB (in docker container) and cosmos.
- Introduction to Tinkerpop graphs
- DEMO: Graphs API. Download sample .NET app. Simple queries.
https://techspark.mt/global-azure-bootcamp-27th-april-2019/
This document provides an overview of Active Directory, including its logical and physical structures, the role of DNS, and methods for administration. It describes how Active Directory organizes, manages and controls network resources through a centralized directory. Key components include domains, organizational units, replication between domain controllers, and use of Group Policy for centralized management of users and computers.
The document provides an overview of configuring Domain Name System (DNS) including:
- Reviewing DNS concepts such as zones, resource records, and name resolution
- Installing and configuring DNS in an Active Directory domain, including creating zones, records, and redundant DNS servers
- The relationship between Active Directory, DNS, and Windows including integrating DNS with the domain namespace, split-brain DNS, delegations, and dynamic updates
The document discusses the key components and structures of Active Directory, including partitions, domains, sites, domain controllers, functional levels, and roles. It describes the schema, configuration, and domain partitions that make up the Active Directory database. It also explains trust relationships, trees, and forests in an Active Directory implementation.
The document discusses the key components and structures of Active Directory, including partitions, domains, sites, domain controllers, functional levels, and roles. It describes the schema, configuration, and domain partitions that make up the Active Directory database. It also explains trust relationships, trees, and forests in an Active Directory implementation.
Modeling data and best practices for the Azure Cosmos DB.Mohammad Asif
Azure Cosmos DB is Microsoft's globally distributed, multi-model database service. In this session we covered ,modeling of data using NOSQL cosmos database and how it's helpful for distributed application to maintain high availability ,scaling in multiple region and throughput.
This document discusses strategies for handling large amounts of data in web applications. It begins by providing examples of how much data some large websites contain, ranging from terabytes to petabytes. It then covers various techniques for scaling data handling capabilities including vertical and horizontal scaling, replication, partitioning, consistency models, normalization, caching, and using different data engine types beyond relational databases. The key lessons are that data volumes continue growing rapidly, and a variety of techniques are needed to scale across servers, datacenters, and provide high performance and availability.
The document provides an overview of Microsoft Azure's data platform and various database options, including SQL Database, SQL Server VMs, DocumentDB, HDInsight, and Azure Search. It discusses the architecture and features of these services, how to provision and manage databases, and includes demos of interacting with the databases. The key services covered allow for relational, non-relational, and search databases hosted on Azure infrastructure at varying levels of management and control.
Delphi ORM SOA MVC SQL NoSQL JSON REST mORMotArnaud Bouchez
Slides published for BeDelphi 2014 Event.
Create high performance Client Server ORM SOA REST MVC applications using Open Source Synopse mORMot framework and Delphi. Publish any SQL or NoSQL database content over JSON or XML: SQLite3, PostgreSQL, Oracle, MSSQL, FireBird, MongoDB. Define RESTful services using interfaces. Create MVC web applications, using Mustache templates. Running under Windows or Linux, with VCL/FMX clients on Mac OSX, Android or iOS/iPhone/iPad, or AJAX/PhoneGap.
This document provides an overview of Active Directory fundamentals, including:
- Logical concepts such as domains, trees, forests and organizational units.
- Physical concepts such as domain controllers, sites, and replication.
- The role of DNS and an overview of Active Directory replication.
- Operations master roles such as schema master and domain master.
The document includes examples, demos, and resources to help understand Active Directory concepts.
- Microsoft Active Directory is Microsoft's directory service that is the successor to LAN Manager domains and aims for open standards, high scalability, and simplified administration.
- Active Directory uses LDAP and Kerberos and has a hierarchical structure with domains, organizational units, trees, and forests. It contains objects like users, groups, computers, and supports custom objects.
- Key components include domains, which are the basic units and implement policies and administration; schemas, which define object types and attributes; and domain controllers, which store and authenticate access to the directory.
- Microsoft Active Directory is Microsoft's directory service that is the successor to LAN Manager domains and aims for open standards, high scalability, and simplified administration.
- Active Directory uses LDAP and Kerberos and has a hierarchical structure with domains, organizational units, trees, and forests. It contains objects like users, groups, computers, and supports custom objects.
- Key components include domains, which are the basic units and implement policies and administration; schemas, which define object types and attributes; and domain controllers, which store and manage directory data.
MongoDB - A next-generation database that lets you create applications never ...Ram Murat Sharma
MongoDB is a cross-platform document-oriented database. Classified as a NoSQL database, MongoDB eschews the traditional table-based relational database structure in favor of JSON-like documents with dynamic schemas (MongoDB calls the format BSON), making the integration of data in certain types of applications easier and faster.
Active Directory is a hierarchical directory service for Windows domain networks that stores information about objects on the network such as user accounts, groups, computers, printers, and other network resources. It provides a centralized system for managing these resources. A domain controller is a server that contains the Active Directory database and controls access to network resources. A domain is a collection of computers, users, and groups that share a common directory database and security policies.
The document discusses the Domain Name System (DNS), including:
- DNS allows humans to use domain names to access internet resources while computers use IP addresses.
- DNS is hierarchical, distributed across servers globally, and designed for resilience and to avoid single points of failure.
- DNS works by mapping domain names to IP addresses through a hierarchy of root servers, top-level domain servers and authoritative DNS servers.
- The DNS namespace is hierarchical with top-level domains like .com and country domains, with future improvements focusing on security, IPv6 integration, and ties to directory services.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Ad
More Related Content
Similar to Microsoft Active Directory Fundament.ppt (20)
A directory service stores and organizes information about a computer network's users and resources. Active Directory is Microsoft's implementation of an LDAP directory service that allows administrators to define and manage objects like users, printers, and servers across an organization. It provides authentication, authorization, and other services to users and applications. Active Directory replicates information across domain controllers to provide redundancy and high availability.
Cosmos DB is Microsoft's flagship Serverless database service in the Azure cloud. This slide-deck, presented at the Nashville Azure Meetup event on 09/20/2018 covers the why and what of Cosmos DB was is meant to be a good segue into further detailed and advanced topics. The slide-deck presents 3 use-cases for using Cosmos DB in E-Commerce, Healthcare, and IoT. Stay Tuned!
Overview of Netflix edge architecture, the DNS portability problem, and Denominator. Contains a sidebar on Square Dagger.
Some slides lifted from adrianco's dystopian deck.
The event, held on 27th April 2019, was part of the Global Azure Bootcamp and covered Microsoft's Cosmos DB, more specifically:
- Introduction to Cosmos DB, its features, internals, resource models, and request units.
- DEMO: Create an SQL API. Download sample .NET app. Simple queries.
- Covered Change Feed and showcased various use case scenarios.
- Detailed Global Distribution and Consistency Models implications.
- DEMO: Mongo - Lift and shift. Run simple .NET code against a MongoDB (in docker container) and cosmos.
- Introduction to Tinkerpop graphs
- DEMO: Graphs API. Download sample .NET app. Simple queries.
https://techspark.mt/global-azure-bootcamp-27th-april-2019/
This document provides an overview of Active Directory, including its logical and physical structures, the role of DNS, and methods for administration. It describes how Active Directory organizes, manages and controls network resources through a centralized directory. Key components include domains, organizational units, replication between domain controllers, and use of Group Policy for centralized management of users and computers.
The document provides an overview of configuring Domain Name System (DNS) including:
- Reviewing DNS concepts such as zones, resource records, and name resolution
- Installing and configuring DNS in an Active Directory domain, including creating zones, records, and redundant DNS servers
- The relationship between Active Directory, DNS, and Windows including integrating DNS with the domain namespace, split-brain DNS, delegations, and dynamic updates
The document discusses the key components and structures of Active Directory, including partitions, domains, sites, domain controllers, functional levels, and roles. It describes the schema, configuration, and domain partitions that make up the Active Directory database. It also explains trust relationships, trees, and forests in an Active Directory implementation.
The document discusses the key components and structures of Active Directory, including partitions, domains, sites, domain controllers, functional levels, and roles. It describes the schema, configuration, and domain partitions that make up the Active Directory database. It also explains trust relationships, trees, and forests in an Active Directory implementation.
Modeling data and best practices for the Azure Cosmos DB.Mohammad Asif
Azure Cosmos DB is Microsoft's globally distributed, multi-model database service. In this session we covered ,modeling of data using NOSQL cosmos database and how it's helpful for distributed application to maintain high availability ,scaling in multiple region and throughput.
This document discusses strategies for handling large amounts of data in web applications. It begins by providing examples of how much data some large websites contain, ranging from terabytes to petabytes. It then covers various techniques for scaling data handling capabilities including vertical and horizontal scaling, replication, partitioning, consistency models, normalization, caching, and using different data engine types beyond relational databases. The key lessons are that data volumes continue growing rapidly, and a variety of techniques are needed to scale across servers, datacenters, and provide high performance and availability.
The document provides an overview of Microsoft Azure's data platform and various database options, including SQL Database, SQL Server VMs, DocumentDB, HDInsight, and Azure Search. It discusses the architecture and features of these services, how to provision and manage databases, and includes demos of interacting with the databases. The key services covered allow for relational, non-relational, and search databases hosted on Azure infrastructure at varying levels of management and control.
Delphi ORM SOA MVC SQL NoSQL JSON REST mORMotArnaud Bouchez
Slides published for BeDelphi 2014 Event.
Create high performance Client Server ORM SOA REST MVC applications using Open Source Synopse mORMot framework and Delphi. Publish any SQL or NoSQL database content over JSON or XML: SQLite3, PostgreSQL, Oracle, MSSQL, FireBird, MongoDB. Define RESTful services using interfaces. Create MVC web applications, using Mustache templates. Running under Windows or Linux, with VCL/FMX clients on Mac OSX, Android or iOS/iPhone/iPad, or AJAX/PhoneGap.
This document provides an overview of Active Directory fundamentals, including:
- Logical concepts such as domains, trees, forests and organizational units.
- Physical concepts such as domain controllers, sites, and replication.
- The role of DNS and an overview of Active Directory replication.
- Operations master roles such as schema master and domain master.
The document includes examples, demos, and resources to help understand Active Directory concepts.
- Microsoft Active Directory is Microsoft's directory service that is the successor to LAN Manager domains and aims for open standards, high scalability, and simplified administration.
- Active Directory uses LDAP and Kerberos and has a hierarchical structure with domains, organizational units, trees, and forests. It contains objects like users, groups, computers, and supports custom objects.
- Key components include domains, which are the basic units and implement policies and administration; schemas, which define object types and attributes; and domain controllers, which store and authenticate access to the directory.
- Microsoft Active Directory is Microsoft's directory service that is the successor to LAN Manager domains and aims for open standards, high scalability, and simplified administration.
- Active Directory uses LDAP and Kerberos and has a hierarchical structure with domains, organizational units, trees, and forests. It contains objects like users, groups, computers, and supports custom objects.
- Key components include domains, which are the basic units and implement policies and administration; schemas, which define object types and attributes; and domain controllers, which store and manage directory data.
MongoDB - A next-generation database that lets you create applications never ...Ram Murat Sharma
MongoDB is a cross-platform document-oriented database. Classified as a NoSQL database, MongoDB eschews the traditional table-based relational database structure in favor of JSON-like documents with dynamic schemas (MongoDB calls the format BSON), making the integration of data in certain types of applications easier and faster.
Active Directory is a hierarchical directory service for Windows domain networks that stores information about objects on the network such as user accounts, groups, computers, printers, and other network resources. It provides a centralized system for managing these resources. A domain controller is a server that contains the Active Directory database and controls access to network resources. A domain is a collection of computers, users, and groups that share a common directory database and security policies.
The document discusses the Domain Name System (DNS), including:
- DNS allows humans to use domain names to access internet resources while computers use IP addresses.
- DNS is hierarchical, distributed across servers globally, and designed for resilience and to avoid single points of failure.
- DNS works by mapping domain names to IP addresses through a hierarchy of root servers, top-level domain servers and authoritative DNS servers.
- The DNS namespace is hierarchical with top-level domains like .com and country domains, with future improvements focusing on security, IPv6 integration, and ties to directory services.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
📕 Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
👨🏫 Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
Quantum Computing Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
Procurement Insights Cost To Value Guide.pptxJon Hansen
Procurement Insights integrated Historic Procurement Industry Archives, serves as a powerful complement — not a competitor — to other procurement industry firms. It fills critical gaps in depth, agility, and contextual insight that most traditional analyst and association models overlook.
Learn more about this value- driven proprietary service offering here.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
We’re bringing the TDX energy to our community with 2 power-packed sessions:
🛠️ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
📄 Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
2. What we will cover:
What we will cover:
Domains, Trees, Forests
Domains, Trees, Forests
Domain Controllers, Sites
Domain Controllers, Sites
The Domain Naming Service (DNS)
The Domain Naming Service (DNS)
Replication
Replication
Operations Masters
Operations Masters
Lots of demos….
Lots of demos….
4. Agenda
Agenda
Active Directory Logical Concepts
Active Directory Logical Concepts
Active Directory Physical Concepts
Active Directory Physical Concepts
DNS
DNS
Replication
Replication
Operations Masters
Operations Masters
5. Active Directory Logical
Active Directory Logical
Concepts
Concepts
Domains
Domains
Boundary of Security
Boundary of Security
Authentication
Authentication
Security Policies
Security Policies
Boundary of Replication
Boundary of Replication
Domain NC Replication
Domain NC Replication
Boundary of DNS Namespace
Boundary of DNS Namespace
Boundary of Administration
Boundary of Administration KAPOHO.NET
6. Active Directory Logical Concepts
Active Directory Logical Concepts
Trees
Trees
Hierarchy of Domains forming a
Hierarchy of Domains forming a
contiguous namespace
contiguous namespace
Transitive Trust Relationships
Transitive Trust Relationships
All Domains in a Tree share:
All Domains in a Tree share:
Schema
Schema
Configuration
Configuration
Global Catalog
Global Catalog
KAPOHO.NET
EUROPE.KAPOHO.NET
HAWAII.KAPOHO.NET
MAUI.HAWAII.KAPOHO.NET
7. Hierarchy of Domains forming a
Hierarchy of Domains forming a
contiguous or disjoint namespace
contiguous or disjoint namespace
Transitive Trust Relationships
Transitive Trust Relationships
All Domains in a Forest share:
All Domains in a Forest share:
Schema
Schema
Configuration
Configuration
Global Catalog
Global Catalog
PSP.CO.UK KAPOHO.NET
HAWAII.KAPOHO.NET
Active Directory Logical Concepts
Active Directory Logical Concepts
Forests
Forests
8. Containers within Domains
Containers within Domains
Distinct Units of Administration
Distinct Units of Administration
Unique to Domains
Unique to Domains
Active Directory Logical Concepts
Active Directory Logical Concepts
Organizational Units
Organizational Units
9. Agenda
Agenda
Active Directory Logical Concepts
Active Directory Logical Concepts
Active Directory Physical Concepts
Active Directory Physical Concepts
DNS
DNS
Replication
Replication
Operations Masters
Operations Masters
11. What is a Site?
What is a Site?
A set of well-connected IP subnets
A set of well-connected IP subnets
Site Usage
Site Usage
Locating Services (e.g. Logon, DFS)
Locating Services (e.g. Logon, DFS)
Replication
Replication
Group Policy Application
Group Policy Application
Sites are connected with Site Links
Sites are connected with Site Links
Connects two or more sites
Connects two or more sites
Active Directory Physical
Active Directory Physical
Concepts
Concepts
Sites
Sites
12. Active Directory Physical
Active Directory Physical
Concepts
Concepts
Site Topology
Site Topology
Company.com
america.company.com europe.company.com
DC
Site A
Site B
Site C
DC
GC
GC
DC
DC
DC = Domain Controller
GC = Global Catalog
13. Partial Replica of all Objects
Partial Replica of all Objects
in the Forest
in the Forest
Configurable subset of Attributes
Configurable subset of Attributes
Fast Forest-wide searches
Fast Forest-wide searches
Required at Logon for Universal
Required at Logon for Universal
Group Membership
Group Membership
Active Directory Physical
Active Directory Physical
Concepts
Concepts
Global Catalog
Global Catalog
14. Agenda
Agenda
Active Directory Logical Concepts
Active Directory Logical Concepts
Active Directory Physical Concepts
Active Directory Physical Concepts
DNS
DNS
Replication
Replication
Operations Masters
Operations Masters
15. SRV Records to locate services (req’d)
SRV Records to locate services (req’d)
DDNS for Dynamic Update (desired)
DDNS for Dynamic Update (desired)
Windows 2000 and up, DNS also
Windows 2000 and up, DNS also
provides:
provides:
Incremental Zone Transfers
Incremental Zone Transfers
Integration with Active Directory
Integration with Active Directory
Single replication topology
Single replication topology
Multi-master replication
Multi-master replication
Secure Dynamic updates
Secure Dynamic updates
DNS
DNS
DNS Requirements
DNS Requirements
16. DNS
DNS
DNS
DNS Implementations
Implementations
No existing DNS infrastructure
No existing DNS infrastructure
Deploy Microsoft DNS
Deploy Microsoft DNS
Check existing DNS meets requirements
Check existing DNS meets requirements
Existing DNS not adequate:
Existing DNS not adequate:
Choice 1: Update Server
Choice 1: Update Server
Choice 2: Migrate to Microsoft DNS
Choice 2: Migrate to Microsoft DNS
Choice 3: Delegate a subdomain to
Choice 3: Delegate a subdomain to
Microsoft DNS
Microsoft DNS
17. Agenda
Agenda
Active Directory Logical Concepts
Active Directory Logical Concepts
Active Directory Physical Concepts
Active Directory Physical Concepts
DNS
DNS
Replication
Replication
Operations Masters
Operations Masters
18. Naming Contexts (NCs)that are
Naming Contexts (NCs)that are
replicated
replicated
Schema Naming Context
Schema Naming Context
Configuration Naming Context
Configuration Naming Context
Domain Naming Context
Domain Naming Context
Multi-master Replication
Multi-master Replication
Intra-site Bi-directional Ring
Intra-site Bi-directional Ring
Topology
Topology
Inter-site Spanning Tree Topology
Inter-site Spanning Tree Topology
Synchronous RPC over TCP/IP
Synchronous RPC over TCP/IP
Asynchronous SMTP
Asynchronous SMTP
Replication
Replication
Replication Details
Replication Details
19. Schema
Schema
Definitions of object classes and
Definitions of object classes and
attributes
attributes
Replicated to all DCs in the forest
Replicated to all DCs in the forest
Configuration
Configuration
AD Structure (domains, sites, and
AD Structure (domains, sites, and
where the DCs are)
where the DCs are)
Replicated to all DCs in the forest
Replicated to all DCs in the forest
Domain
Domain
Domain specific objects (users,
Domain specific objects (users,
groups, computers, and OUs)
groups, computers, and OUs)
Replication
Replication
Naming Contexts
Naming Contexts
20. Intra-site Replication: AD replication
Intra-site Replication: AD replication
between DCs within a Site
between DCs within a Site
Inter-site Replication: AD replication
Inter-site Replication: AD replication
between Sites
between Sites
Replication
Replication
Replication Topologies
Replication Topologies
21. RPC replication within a Site
RPC replication within a Site
No compression
No compression
Assumes good network connections
Assumes good network connections
Uses notification process
Uses notification process
5 minutes
5 minutes -2k
-2k
Less – 2k3
Less – 2k3
KCC generates a bi-directional Ring
KCC generates a bi-directional Ring
with extra edges
with extra edges
Tip: Always let KCC generate the intra-site
Tip: Always let KCC generate the intra-site
replication topology when possible
replication topology when possible
Replication
Replication
Intra-site Replication
Intra-site Replication
22. Replication between Sites
Replication between Sites
DS-RPC (RPC over IP) or
DS-RPC (RPC over IP) or
SMTP Transports
SMTP Transports
SMTP can be used only between
SMTP can be used only between
GCs across Sites
GCs across Sites
DCs of different domains and in
DCs of different domains and in
different sites
different sites
Compression
Compression
10%-20% of original size
10%-20% of original size
Scheduled
Scheduled
Replication
Replication
Inter-Site Replication
Inter-Site Replication
23. Site-links link two or more sites
Site-links link two or more sites
Costs and schedules can be specified
Costs and schedules can be specified
Transitive (can be disabled)
Transitive (can be disabled)
Site-link Bridges
Site-link Bridges
Bridge two or more site-links
Bridge two or more site-links
Bridgehead servers
Bridgehead servers
KCC generates a minimum cost
KCC generates a minimum cost
spanning tree
spanning tree
Tip: Always let KCC generate the replication topology
Tip: Always let KCC generate the replication topology
Replication
Replication
Site-links, Bridges and
Site-links, Bridges and
Bridgehead Servers
Bridgehead Servers
24. Agenda
Agenda
Active Directory Logical Concepts
Active Directory Logical Concepts
Active Directory Physical Concepts
Active Directory Physical Concepts
DNS
DNS
Replication
Replication
Operations Masters
Operations Masters
25. Schema
Schema
Performs updates to schema
Performs updates to schema
Sends updates to all DCs
Sends updates to all DCs
One per forest
One per forest
Default is the first DC installed
Default is the first DC installed
Domain
Domain
Performs add/remove of domains and
Performs add/remove of domains and
cross-references to external DS
cross-references to external DS
One per forest
One per forest
Default is the first DC installed
Default is the first DC installed
Operations Masters
Operations Masters
Schema and Domain
Schema and Domain
26. Primary Domain Controller (PDC)
Primary Domain Controller (PDC)
Acts as a PDC for requests from NT clients
Acts as a PDC for requests from NT clients
One per domain
One per domain
Relative Identifier (RID)
Relative Identifier (RID)
Generates pools of security identifiers to be
Generates pools of security identifiers to be
distributed to DCs in the domain
distributed to DCs in the domain
One per domain
One per domain
Infrastructure
Infrastructure
Updates SIDs on objects across domains
Updates SIDs on objects across domains
One per domain
One per domain
Not required in a single-domain forest
Not required in a single-domain forest
Operations Masters
Operations Masters
PDC, RID and Infrastructure
PDC, RID and Infrastructure
27. Summary
Summary
There are Logical and Physical concepts
There are Logical and Physical concepts
in Active Directory
in Active Directory
DNS
DNS
Plenty of Information
Plenty of Information
28. For More Information…
For More Information…
Main TechNet Web site at
Main TechNet Web site at
www.microsoft.com/technet
www.microsoft.com/technet
Additional resources to support this Session page can
Additional resources to support this Session page can
be found at
be found at
www.microsoft.com/technet/tnt1-98
www.microsoft.com/technet/tnt1-98
29. MS Press
MS Press
Inside information for IT Professionals
Inside information for IT Professionals
To find the latest IT Professional related titles visit
To find the latest IT Professional related titles visit
www.microsoft.com/learning/it/books
www.microsoft.com/learning/it/books
30. Third Party Publications
Third Party Publications
Supplementary Publications for IT Pros
Supplementary Publications for IT Pros
These books can be found and purchased at all good book
These books can be found and purchased at all good book
stores and on-line retailers
stores and on-line retailers
31. Microsoft Learning
Microsoft Learning
Training Resources for IT Professionals
Training Resources for IT Professionals
Planning, Implementing, and Maintaining a Microsoft
Planning, Implementing, and Maintaining a Microsoft
Windows Server 2003 Active Directory Infrastructure
Windows Server 2003 Active Directory Infrastructure
Course Number: 2279
Course Number: 2279
Availability: Now
Availability: Now
Detailed Syllabus: www.microsoft.com/learning
Detailed Syllabus: www.microsoft.com/learning
To locate a training provider, please access
To locate a training provider, please access
www.microsoft.com/learning
Microsoft Certified Technical Education Centers
Microsoft Certified Technical Education Centers
are Microsoft’s premier partners for training services
are Microsoft’s premier partners for training services
32. Assess your Readiness
Assess your Readiness
Microsoft Skills Assessment
Microsoft Skills Assessment
What is Microsoft Skills Assessment?
What is Microsoft Skills Assessment?
Self-study learning tool to evaluate readiness for product and
Self-study learning tool to evaluate readiness for product and
technology solutions, instead of job-roles (certification)
technology solutions, instead of job-roles (certification)
Windows Server 2003
Windows Server 2003,
, Exchange Server 2003, Windows Storage
Exchange Server 2003, Windows Storage
Server 2003, Visual Studio .NET, Office 2003
Server 2003, Visual Studio .NET, Office 2003
Free, online, unproctored, and available to anyone
Free, online, unproctored, and available to anyone
Answers, “Am I ready?”
Answers, “Am I ready?”
Determines skills gaps, provides learning plans with Microsoft
Determines skills gaps, provides learning plans with Microsoft
Official Curriculum courses, plus more Microsoft learning content
Official Curriculum courses, plus more Microsoft learning content
suggestions such as TechNet resources
suggestions such as TechNet resources
Post your High Score to see how you stack up
Post your High Score to see how you stack up
visit
visit http://www.microsoft.com/assessment
http://www.microsoft.com/assessment
33. Become a Microsoft Certified
Become a Microsoft Certified
Systems Administrator
Systems Administrator
(MCSA)
(MCSA)
What is the MCSA certification?
What is the MCSA certification?
For
For IT professionals who manage and maintain
IT professionals who manage and maintain
networks and systems based on the Microsoft
networks and systems based on the Microsoft
Windows Server operating system
Windows Server operating system
How do I become an MCSA on Microsoft
How do I become an MCSA on Microsoft
Windows 2003?
Windows 2003?
Pass 3 core exams
Pass 3 core exams
Pass 1 elective exam or 2 CompTIA certifications
Pass 1 elective exam or 2 CompTIA certifications
Where do I get more information?
Where do I get more information?
For more information about certification
For more information about certification
requirements, exams, and training,
requirements, exams, and training,
visit
visit www.microsoft.com/mcsa
www.microsoft.com/mcsa
34. Become A Microsoft Certified
Become A Microsoft Certified
Systems Engineer (MCSE)
Systems Engineer (MCSE)
What is the MCSE certification?
What is the MCSE certification?
Premier certification for IT
Premier certification for IT professionals who analyze the
professionals who analyze the
business requirements and design, plan, and implement the
business requirements and design, plan, and implement the
infrastructure for business solutions based on the Microsoft
infrastructure for business solutions based on the Microsoft
Windows Server System integrated server software.
Windows Server System integrated server software.
How do I become an MCSE on Microsoft Windows 2003?
How do I become an MCSE on Microsoft Windows 2003?
Pass 6 core exams
Pass 6 core exams
Pass 1 elective exams from a comprehensive list
Pass 1 elective exams from a comprehensive list
Where do I get more information?
Where do I get more information?
For more information about certification requirements,
For more information about certification requirements,
exams, and training options,
exams, and training options,
visit
visit www.microsoft.com/mcse
www.microsoft.com/mcse
35. Demonstrate Your Security or
Demonstrate Your Security or
Messaging Specialization
Messaging Specialization
What are MCSA/MCSE specializations?
What are MCSA/MCSE specializations?
MCSA and MCSE specializations allow IT professionals to
MCSA and MCSE specializations allow IT professionals to
highlight specific expertise or technical focus within their job
highlight specific expertise or technical focus within their job
role.
role.
What specializations are available?
What specializations are available?
MCSA: Security
MCSA: Security
MCSA: Messaging
MCSA: Messaging
MCSE: Security
MCSE: Security
MCSE: Messaging
MCSE: Messaging
Where do I get more information?
Where do I get more information?
For more information about MCSA and MCSE specialization
For more information about MCSA and MCSE specialization
requirements, exams, and training options, visit
requirements, exams, and training options, visit
www.microsoft.com/mcsa
www.microsoft.com/mcsa or
or www.microsoft.com/mcse
www.microsoft.com/mcse
36. What is TechNet?
What is TechNet?
Put the right answers at your fingertips
Put the right answers at your fingertips
TechNet is the comprehensive collection of resources to help IT
TechNet is the comprehensive collection of resources to help IT
implementers plan, deploy, and manage Microsoft products
implementers plan, deploy, and manage Microsoft products
successfully
successfully
Monthly updates delivered on DVD or CD
Monthly updates delivered on DVD or CD
The definitive resource to help you evaluate, deploy and
The definitive resource to help you evaluate, deploy and
maintain Microsoft products
maintain Microsoft products
TechNet
Subscription
Accessible at
Accessible at www.microsoft.com/technet
Online resources and community
Online resources and community
Subscriber-only Online Services
Subscriber-only Online Services
TechNet Web Site
Bi-weekly e-newsletter
Bi-weekly e-newsletter
Security updates, new resources, and special offers
Security updates, new resources, and special offers
TechNet Flash
Briefings on the latest Microsoft products and technologies
Briefings on the latest Microsoft products and technologies
Hands-on, “how to” information
Hands-on, “how to” information
TechNet Events
and Web Casts
User Groups
User Groups
Managed Newsgroups
Managed Newsgroups
TechNet
Communities
37. Where Can I Get TechNet?
Where Can I Get TechNet?
Visit TechNet Online at
Visit TechNet Online at
www.microsoft.com/technet
www.microsoft.com/technet
Register for the TechNet Flash
Register for the TechNet Flash
www.microsoft.com/technet/subscriptions/flash.asp
www.microsoft.com/technet/subscriptions/flash.asp
Join the TechNet Online forum at
Join the TechNet Online forum at
www.microsoft.com/technet/itcommunity
www.microsoft.com/technet/itcommunity
Become a TechNet Subscriber at
Become a TechNet Subscriber at
www.microsoft.com/technet/buynow/subscribe
www.microsoft.com/technet/buynow/subscribe
Attend More TechNet Events or view on-line
Attend More TechNet Events or view on-line
www.microsoft.com/technet/tcevents/itevents
www.microsoft.com/technet/tcevents/itevents
Editor's Notes
#1: KEY MESSAGE: Introduce yourself and then the session title
SLIDE BUILDS: None
SLIDE SCRIPT:
Hello and Welcome to this TechNet session on Active Directory Fundamentals
My name is {state your name and title}
SLIDE TRANSITION: What are we going to cover
ADDITIONAL INFORMATION FOR PRESENTER:
#2: KEY MESSAGE: What are we going to cover?
SLIDE BUILDS: None
SLIDE SCRIPT:
So in today’s session, we will be looking at what makes up Active Directory directory service and covering the terms you will hear when people talk about the service.
Some of these components are logical in nature, such as Domains, Domain trees, and Forests; some physical in nature, such as Domain Controllers and sites.
We will also cover the Domain Naming Service (DNS) and how that plays a part in the Active Directory operations.
As well, we will look at site communication and how information is replicated around so that everyone has the same view of the directory.
Finally, we cover the Operations Masters.
SLIDE TRANSITION:
#3: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
Since this is a fundamentals session, there are not really product-specific requirements. However, an understanding of what a directory service is will come in handy.
SLIDE TRANSITION:
#4: KEY MESSAGE: Today’s Agenda
SLIDE BUILDS: None
SLIDE SCRIPT:
So as we mentioned in what we will be covering, the agenda divides into the Physical and Logical components of Active Directory. The Domain Naming Service (DNS), Replication, which will include sites and finally the Operations Masters.
SLIDE TRANSITION: So let’s start with the Logical Concepts.
ADDITIONAL INFORMATION FOR PRESENTER:
#5: KEY MESSAGE: Define what a Domain is.
SLIDE BUILDS: None
SLIDE SCRIPT:
A domain is the core unit of logical structure in Active Directory. Domains represent a logical partition within the Active Directory for both security and directory replication. Each domain stores information only about the objects it contains. Theoretically, a domain directory can contain up to 10 million objects, but 1 million objects per domain is the supported (tested) limit. Domains function in several capacities. They serve as boundaries of authentication, replication, namespace, and security policies. Domains are manifested from domain controllers. There is also a one-to-one correspondence between Active Directory Domains and DNS Domains. Since all users in a domain must log on to a domain controller for that domain, a domain is also:
A boundary of authentication. Domain controllers are responsible for authenticating users and groups.
A boundary of security policies. Certain security policies are applied exclusively at the domain level, including Password Length, Account Lockout, and Kerberos Ticket Lifetime. Security policies that are defined in one Domain are not extended to any other Domain. In addition, access to domain objects is controlled by Discretionary Access Control Lists (DACLs), which are populated with Access Control Entries (ACEs). All security polices and settings, such as administrative rights and Discretionary Access Control Lists (DACLs), do not cross from one domain to another. The domain administrator has the right to set policies only within that domain. So, domains are also boundaries of administration because privileges that are granted in one Domain do not extend to any other Domain.
A boundary of replication. All objects that reside in a Domain are fully replicated to all Domain Controllers for that Domain. The Domain Controllers for a Domain each have a complete writeable replica of that Active Directory Partition (i.e. Domain).
A unique namespace. An Active Directory Domain is identified by a unique DNS domain name, as well as a downlevel NetBIOS name for downlevel client and server access.
A boundary of administration. Administrative privileges that are granted in one Domain do not extend to any other Domain.
Domains are manifested in the form of domain controllers. In Windows Server 2003, there are no longer PDCs and BDCs. Instead, every Domain Controller maintains a writeable copy of the domain database (directory information tree: ntds.dit).
There are various function levels that a domain can operate in: mixed (default), native or Windows 2003:
Mixed. When a Domain is in mixed mode, the Active Directory Domain Controllers in the Domain can coexist and replicate with Domain Controllers in the same Domain that are running previous versions of Windows NT Server (downlevel domain controllers). When a Domain is in mixed mode, it is subject to the restrictions of the downlevel SAM (Security Accounts Manager) database (40MB size, 40,000 account objects), you want to begin operating in Native mode or Windows Server 2003 mode as soon as possible.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#6: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
The next two logical concepts we will address are ways to group domains to form different structures. The first topic is trees.
A tree is a hierarchical grouping of Domains that form a contiguous namespace. A contiguous namespace links a child container to its parent by adding one and only one more identifier to the beginning of the DNS name. For example, if the parent Domain was named COMPANY and the child Domain was named AMERICA.COMPANY, then these two domains would form a contiguous namespace.
In an Active Directory Tree, transitive trust relationships link Domains such that they can be administered as a single logical unit. With bi-directional Kerberos transitive trusts, permissions can be applied to security principals throughout the Active Directory Tree. Every time a new domain is added to the tree, a transitive trust is formed. If domain “A” trusts domain “B,” then domain “A” trusts all domains that “B” trusts.
The name of an Active Directory Tree is the name of the Domain that is highest in the hierarchy. In the example shown here, the name of the Tree is COMPANY, and is referred to as the Root of the Domain Tree.
All Domains in an Active Directory Tree share the following:
Schema. The schema is the formal definition for all Active Directory objects, including the object classes and object attributes. The schema also defines things such as whether attributes are required for particular object classes and the relationship between object classes. The schema is stored within the Active Directory and is extensible, meaning that new object classes and attributes can be added to the Active Directory. A single schema container exists and applies to all Domains in the Active Directory Tree. The schema is replicated to all Domain Controllers in all Domains in the Active Directory Tree in order to ensure consistency in the object types across the enterprise.
Configuration. A single configuration container exists and applies to all Domains in the Active Directory Tree. The configuration container includes information about the Active Directory as a whole, including what Domains exist, what physical Sites are defined, what Domain Controllers are running in what Domains and in what Sites, what Services are available, and so forth. The configuration container is replicated to all Domain Controllers in all Domains in the Active Directory Tree in order to allow Domain Controllers to determine replication partners and develop a replication topology.
Global Catalog. The Global Catalog – or GC – contains a partial replica of all objects in the Active Directory Tree (i.e. every object in every Domain in the Tree is represented in the Global Catalog). All GCs in an Active Directory Tree share exactly the same partial replica.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#7: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
A forest is composed of one or more trees. First, let’s define what a forest is.
A Forest is an extension of the Domain Tree concept in that the only difference is that a set of Domains in a Forest may form either a contiguous or disjoint namespace. An example of a disjoint namespace is DIV1.COM and DIV2.COM (the namespace does not form a contiguous hierarchy). A Forest is named after the first Domain installed in the Forest (the Forest Root Domain). In addition to the transitive trust relationships that exist between parent and child domains, in a Forest there are also bi-directional transitive trust relationships between peer top-level domains.
A Domain Tree is a specific example of a Domain Forest (in which all of the Domains in that Tree form a contiguous namespace). An enterprise directory that consists of a single Domain is another example of a Forest.
In a Forest, all Domains still share a common Schema, Configuration, and Global Catalog.
If the Forest is in the highest forest function level, Windows 2003, then cross-forest trusts can be established to facilitate administration or resource access between domains in different forests.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#8: KEY MESSAGE: Describe Organizational Units
SLIDE BUILDS: None
SLIDE SCRIPT:
Organizational Units – or OUs – are containers that are used to organize objects within a Domain. For example, OUs can contain Users, Computers, Groups, Printers, File Shares and other OUs. OUs can be logically structured into a hierarchy that models the business.
They are distinct logical administrative units that can be used to:
1.) delegate administration within a domain.
2.) apply policies to objects (such as Users or Computers) as a group.
The OU hierarchy within a particular Domain is independent of the OU hierarchy in any other Domain. Each Domain can implement its own OU hierarchy. OUs are represented by circles within a Domain.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#9: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
So lets move onto the Physical concepts.
SLIDE TRANSITION: Lets start with the Security Model.
#10: KEY MESSAGE: In an Active Directory world, we have moved away from the Primary Domain Controller into the Multi-master environment of Domain Controllers
SLIDE BUILDS: 1
SLIDE SCRIPT:
[BUILD 0] No matter what type of domain structure you run, there is a Domain Controller, and more than likely there is more than one of them. These Domain controllers hold a copy of the directory. In NT3.51 and 4.0 there are two types, a Primary Domain Controller (PDC) and Backup Domain Controllers (BDCs). The copies of the Directory database these machines hold, usually referred to as the SAM (Security Accounts Manager) database, allows users to be authenticated in the domain. This design is a single master system because only the PDC holds a read/write copy of the directory. What this means is that, if a user wants to change his or her password, that change is performed on the PDC, regardless of which machine authenticated the user. In the case were a user is authenticated by a BDC, that BDC sends the change to the PDC to update the SAM, and the SAM is then replicated back to the BDCs. The BDCs never write to their copy of the SAM outside the replication process.
[BUILD 1] In an Active Directory environment there is no single “PDC” and no “BDC.” All machines that participate in the authentication process are simply called Domain Controllers. They all hold copies of the Directory, they can all write to that copy, and they all replicate with each other.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#11: KEY MESSAGE: Describe the Site Concept.
SLIDE BUILDS: None
SLIDE SCRIPT:
So what is a site? An Active Directory Site is a set of TCP/IP subnets that are considered to be “well-connected”. Well-connected generally implies high-bandwidth LAN (10MB minimum) connectivity, possibly involving several hops through routers. Sites are used in the Active Directory as follows:
Sites (a physical construct) are not part of the Active Directory namespace (a logical construct). Sites may span multiple Domains. Similarly, Domains may span multiple Sites.
Sites serve three main purposes. Sites are used to locate services such as logon and DFS services. When a client requests a connection to a DC (and Global Catalog for Universal Group membership info) Login, sites are used to preferentially allow the client to connect to a Domain Controller within the same site. If there are no Domain Controllers in a site with clients, then another site that does have Domain Controllers can provide “coverage” for the client site. Site links each have a logical cost assigned to them. If a user is searching for the closest DC to log on, they will first look for a DC (and GC) in their site. If none exists, they will search for a DC in the site with the lowest logical cost assigned to the site link. When a client requests a connection to a Service, such as a DFS Replica, sites are used to preferentially allow the client to locate and connect to a Replica within the same site.
Sites are also used to control replication throughout an enterprise. The Active Directory automatically creates more replication connections between Domain Controllers in the same site than between Domain Controllers in different sites. This results in lower replication latency within a site, and lower replication bandwidth between sites.
Replication between Domain Controllers in different sites is compressed 10-15%, resulting in less network bandwidth utilization over the slower links between sites.
Finally, Group Policy objects can be linked to Sites (or, more specifically, to Computer objects that reside in Sites) as a group.
Sites are connected using Site Links. Active Directory Site Links are used to define connections between Sites, and together they represent the physical network. A Site Link represents a set of Sites that can communicate with one another. For example, two Sites that are connected with one another with a point-to-point T1 might be represented by a single Site Link. On the other hand, a set of buildings (each in their own Site) that are connected to each other over an ATM backbone might be represented by a Site Link that contains all of those buildings (i.e. Sites). Similarly, a full mesh Frame Relay network might be represented with a single Site Link, assuming each of the Sites had equal cost connectivity to every other Site.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#12: KEY MESSAGE: Explain how Sites and Domains interact
SLIDE BUILDS: None
SLIDE SCRIPT:
Because a Site is a physical construct, there can be overlap with domains, which are a logical construct. A Site can therefore contain an entire domain, or only part of a domain, or even multiple domains. As we see here:
Site A. Contains a DC from the root domain company.com and a DC from the child domain america.company.com.
Site B. Contains a DC only from america.company.com
Site C. Contains DCs from europe.company.com and the root company.com.
This is one of the main concepts to remember and one people get confused on: Domains are logical structures, sites are physical structures.
SLIDE TRANSITION: On the example here, we have this box call GC, which stands for Global Catalog. The Global Catalog is an important part of the Active Directory, so let me explain what it is.
ADDITIONAL INFORMATION FOR PRESENTER:
#13: KEY MESSAGE: Explain the Global Catalog.
SLIDE BUILDS: None
SLIDE SCRIPT:
You will often here the term Global Catalog, most likely abbreviated to GC, bandied around. When people talk about Active Directory, you’ll here it in two contexts, either as the GC or a GC. What’s the difference? Well, “a GC” is a server on which the global catalog is held. “The GC” is the global catalog itself.
In its basic terms, a Global Catalog server is simply a Domain Controller that is also configured to act as a Global Catalog. Global Catalog servers are identified as such in DNS and can be located by clients using DNS.
The Global Catalog contains a partial replica (i.e. a subset of attributes) of all objects in the Forest. This means that some attributes of every object in every domain database in the forest are maintained in the Global Catalog. For example, a domain database may contain many attributes for each user object. It may contain the user’s name, e-mail alias, address, office location, position, manager, phone number, etc., while the Global Catalog might only contain a few of these attributes (i.e. name, e-mail, and phone number). The set of attributes for each object class published in the Global Catalog is configurable.
The Global Catalog is used for fast forest-wide searches of enterprise objects. The Global Catalog is also used during logon to determine Universal Group Membership, since Universal Groups do not reside within any particular Domain.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#14: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
So we’ve covered the logical and physical components of Active Directory. Let’s move on to the Domain Naming Service, more commonly called DNS.
SLIDE TRANSITION:
#15: KEY MESSAGE: What is DNS?
SLIDE BUILDS: None
SLIDE SCRIPT:
Active Directory requires DNS. This is the way that Active Directory finds services and resources. It does this through the use of Service records or SRV records. Therefore, the DNS Server(s) that manage an Active Directory Domain must support the SRV resource records (RFC 2052). The SRV record allows specific services to be registered in DNS. For example, Domain Controllers and Global Catalogs are explicitly registered in DNS with those specific roles. So, when a client is looking for a DC or GC (e.g. for logon), it can locate an appropriate server that is providing that service.
The DNS Server(s) that manage(s) an Active Directory Domain should support the Dynamic Update Protocol (RFC 2136). Windows 2000 or up DNS clients (for A records), as well as DHCP Servers (for PTR records), will dynamically update the Microsoft DNS Server with mappings. Think of this in the same terms as WINS has always worked: clients dynamically update their own information in a WINS database. Well, now DNS allows them to register their IP information in the same way. In addition, Windows 2000 or up servers will register multiple records in DNS based on roles and other criteria. If Dynamic Update were not used, then every time any of the following were modified, DNS would have to be manually updated: DC name, Roles, Sites, IP Addresses, Promotion/Demotion. If your DNS server does not support dynamic updates, you will have a difficult time maintaining the DNS database. It is like trying to manually maintain your WINS today.
Windows 2000 and up also provides:
Incremental Zone Transfers. The Microsoft DNS server also supports Incremental Zone Transfers (RFC 1995). With standard DNS, full zone transfers between Primary and Secondary name servers must be performed whenever there are any changes made to the database.
Management of a single replication topology. Both DNS and AD have databases that are replicated amongst computers. With AD integration of the DNS database, only a single replication topology needs to be managed.
Multi-master update. With standard DNS, changes to the DNS database may only be performed on the Primary name server. Secondary name servers always get their copies of the DNS database from a Primary master (or another secondary master). With AD integration, changes to the DNS database can be performed on any DNS server that manages that zone.
Secure dynamic update (RFC 2137). Allows authentication of hosts that are dynamically registering their names.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#16: KEY MESSAGE: So how do you go about implementing this?
SLIDE BUILDS: None
SLIDE SCRIPT:
How to go about implementing DNS for AD …
As I just mentioned, if there is no pre-existing DNS infrastructure, then the answer is easy. Implement Microsoft DNS (for all of the benefits on the previous slide) and because it’s well-tested with AD and because it’s FREE.
If there is a pre-existing DNS infrastructure in the organization, it must be BIND 8.1.2 or higher. This version of BIND supports SRV records (a must) and DDNS (a really important feature to have). The next step is to understand the impact of Dynamic updates on the DNS traffic in your infrastructure. If all of this is fine, then use your existing DNS.
If your current DNS does not support these features, then you have three choices:
1. Upgrade your existing DNS servers to a version that supports the items outlined above.
2. Migrate to Microsoft DNS (which supports all of this and more).
3. Delegate a sub-domain to Microsoft DNS. For example, if you have company being managed by DNS servers that don’t meet the requirements, and you don’t want to upgrade or migrate, then create a child domain such as “windows.company” and delegate that zone to a Microsoft DNS server.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#17: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT: Now, let’s take a look at replication of Active Directory in more detail.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#18: KEY MESSAGE: Describe the Replication Details
SLIDE BUILDS: None
SLIDE SCRIPT:
There are several replication concepts introduced with Active Directory. The first of these is Naming Contexts. A Naming Context is a partition of Data within the Active Directory. The Active Directory is partitioned up to help reduce what information each Domain Controller holds and therefore what information it has to replicate around. The three predefined naming contexts are:
The Schema Naming Context, which is a Forest-wide Naming Context, is replicated among all Domain Controllers in the Forest.
Configuration NC. This is a Forest-wide Naming Context and is therefore replicated among all Domain Controllers in the Forest.
Domain NC. This is a Domain-wide Naming Context (one per Domain) and is therefore fully replicated to all Domain Controllers in the Domain. In addition, each Domain Naming Context is partially replicated to all Global Catalog Servers in the Forest.
Multi-master Replication. This occurs within each Domain, where each Domain Controller maintains and replicates a complete writeable copy of the domain database. This is a big change from NT 4, where all changes to the Domain database had to be made on the PDC. Now, any DC can makes those changes and the information will work its way around the Domain. The Knowledge Consistency Checker (KCC) automatically generates a replication topology based on the definition of Sites and Site Links.
Intra-site Ring Topology. Within a Site, the KCC automatically generates a bi-directional ring topology for all Domain Controllers in the same Domain. The KCC also ensures that there are no more than three hops from any Domain Controller in a Site to any other Domain Controller in a Site (by adding additional replication partners where necessary).
Intra-site replication is RPC-based, and not compressed, so good network connectivity is assumed.
Between Sites, the KCC automatically generates a spanning tree replication topology. For the Inter-site replication topology, the KCC takes into account whether a Domain Controller has been identified as a Bridgehead Sever as well as the “cost” of each Site Link.
Inter-site replication can be scheduled and is compressed significantly. Two transports can be used for Inter-Site replication:
Synchronous RPC over TCP/IP. This transport can be used to replicate any naming context (Schema, Configuration, Full Domain).
Asynchronous over SMTP. This transport can be used to replicate the Schema, Configuration and Partial Domain (i.e. Global Catalog) information. The SMTP transport cannot be used to replicate a complete Domain database (i.e., it cannot be used for Inter-Site Intra-Domain replication).
Inter-site replication is compressed significantly. Down to 10-15% of original volume for RPC and 20-30% for SMTP.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#19: KEY MESSAGE: So let’s just spend a bit of time and flesh out Naming Contexts.
SLIDE BUILDS: None
SLIDE SCRIPT:
We’ll start with the Schema Context. The Schema Context contains objects that represent all the classes and attributes that the Active Directory Supports. Because the Schema is a forest-wide definition, it is replicated to every Domain Controller in the forest.
The Configuration Naming Context contains all the configuration for the forest. This includes all the information about domains, sites, and where Domain controllers reside. This also is considered forest-wide and replicated to all Domain Controllers.
Finally, the Domain Context. This contains only domain-specific information, such as users, groups, OUs, computers, etc. Each Domain has it’s own context and replicates it only to domain controllers within that domain.
SLIDE TRANSITION: We’ve mentioned the replication a lot so far, let talk about replication topologies.
ADDITIONAL INFORMATION FOR PRESENTER:
The script for this slide was taken in part from O’Reilly’s Active Directory 2nd Edition.
#20: KEY MESSAGE: Introduce the 2 topologies
SLIDE BUILDS: None
SLIDE SCRIPT:
We have two replication topologies available in AD. The first one is the Intra-Site Replication. All DCs present in a site, and which therefore are well connected, replicate using this method. The second one is the Inter-Site Replication. DCs between two sites replicate using this method.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#21: KEY MESSAGE: Go into more detail about Intra-site.
SLIDE BUILDS: None
SLIDE SCRIPT:
Replication within a site is done using RPC. Since connectivity between DCs in a site is good, no compression of replication data is done.
Intra-site replication also uses a change notification process. However, after being notified, replication starts only after a 5 minute pause if the domain controllers are Windows 2000. This pause, known as replication latency is reduced to a matter of seconds in Windows Server 2003 This is done for optimization purposes: gather all changes during this interval since the first change and replicate.
How does each DC know from which DC to replicate? On each DC, it is the job of the Knowledge Consistency Checker (KCC) to generate the appropriate topology based on many factors. For intra-site, it generates a bi-directional ring but with extra edges to minimize hops. One may create connection objects manually to construct the topology. However, it is best left to the KCC to generate the topology.
SLIDE TRANSITION: Let’s look at Inter-site.
ADDITIONAL INFORMATION FOR PRESENTER:
#22: KEY MESSAGE: Go into More detail about Inter-site.
SLIDE BUILDS: None
SLIDE SCRIPT:
The DCs between sites use Inter-site replication. One has two options to use, either the DS-RPC protocol or the SMTP transport for Inter-site replication. However, SMTP can only be used for replication between GCs in different sites and between DCs of two different domains in different sites—in other words, only for configuration and schema NCs. The reason is that there are other critical NT services like FRS which cannot replicate by mail.
Since any DCs in two different sites are not well connected, compression is used in inter-site replication.
Inter-site replication is scheduled, unlike the notification process used in intra-site.
SLIDE TRANSITION:
ADDITIONAL INFORMATION FOR PRESENTER:
#23: KEY MESSAGE: What connects sites so that replication can take place?
SLIDE BUILDS: None
SLIDE SCRIPT:
Inter-site replication is configured using site-links, site-link-bridges, and bridgehead servers. In our next demo, we will show you how to configure all these, but here is a brief description of these.
Site-links link two or more sites. You can associate a cost factor to each site link. This is used by the KCC to generate a replication topology. Site-links are also associated with schedules. Schedules open one or many windows when replication is allowed. Site-links are transitive by default. If there is a link connecting sites A and B, and another link connecting sites B and C, then replication is possible from site A to site C. This is the case if the entire network is IP-routed.
Site-link Bridges are not necessary if site-links are transitive. They are useful if transitivity of Site-links is disabled and must be used in some complex scenarios. They work like bridges or routers in a partitioned network.
You can designate one or more DCs in a site to be a bridgehead server for that site. All inter-site replication traffic would then be chanelled through that DC.
Based on all this configuration, the KCC generates a minimum-cost spanning tree for inter-site replication topology. You can manually add connection objects to construct a topology, but it is always better to let the KCC generate the topology.
SLIDE TRANSITION: Let’s have a quick look at replication in action – DEMO.
ADDITIONAL INFORMATION FOR PRESENTER:
#25: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
We mentioned earlier that the Active Directory is a Multi-master Directory service; all domain controllers can write to the database. However, there are times when this ability for more than one administrator to write to the database is not ideal, and the best way to handle this situation is in a single-master replication model. The way this is handled within the Active Directory is via Operation Masters, or, put another way, one or more servers nominated to perform the operation exclusively. There are five such functions within the Active Directory that require that only one server can perform that function. These functions are collectively call Flexible Single Master Operations, or FSMOs for short.
As with Naming Contexts, some FSMOs are domain-wide and some forest-wide. The first two on the slide here are the forest-wide functions. The DC nominated as the Schema Master is the only machine in the forest allowed to make changes to the schema, i.e. to add classes or attributes. If you go from here to work with Exchange 2000 or 2003, you will know the schema master well because the first part of an Exchange install must be performed on the Schema master to extend the schema. The default schema master is the first DC installed.
The other Forest-wide FMSO role owner is the Domain Master. This DC is allows to make changes to the namespace, in other words, adding or removing domains. This, like the Schema master, is usually the first DC that is installed.
SLIDE TRANSITION: What are the Domain-wide roles?
ADDITIONAL INFORMATION FOR PRESENTER:
#26: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
The first Domain-wide FSMO is the PDC Emulator. This DC acts as the PDC for NT clients. If, for example, you upgrade an NT 4 domain that has a number of BDCs, the PDC emulator is the connection between the BDCs and the Active Directory. Changes such as password changes, account lockouts, etc. are replicated to these downlevel clients. To a BDC, this DC looks like and acts like a PDC.
The Relative Identifier, or RID Master, generates pools of Security Identifiers or SIDs. Whenever a security enabled object is created in a domain, it needs an SID so it can be uniquely identified. Because there can be any number of domain controllers, a system of ensuring that only unique SIDs are allocated is needed. The RID Master creates a pool of unique identifiers and passes them out to each DC in blocks of 512. The DCs then use this pool to assign SIDs to objects. When a DC starts to get low in its pool— below 100 — it asks the RID Master for more.
The final Single Master Function is the Infrastructure Master. This master is used to maintain references to objects in other domains. It is the Infrastructure Master’s responsibility to ensure reference for objects across domains are maintained and always up to date.
One final thing about Operation Masters: If the machine that holds FMSO role goes offline, another machine is not automatically promoted. This is a manual operation that can be done using tools like NTDSUTIL. NTDSUTIL is the only tool that can forcibly move a role around. At any other time, you can use the Active Directory Users and Computers, Active Directory Domains and Trusts or Active Directory Schema consoles to transfer roles.
The Active Directory will function for some time if all the roles are offline, but it is not recommended and you should always be aware of your FSMO role owner’s state.
SLIDE TRANSITION:
So lets wrap up.
ADDITIONAL INFORMATION FOR PRESENTER:
#27: KEY MESSAGE: So these are the topics we’ve covered in today’s session.
SLIDE BUILDS: None
SLIDE SCRIPT:
That brings us to the end of session. I’d like to round off with a couple of things for you to remember. The Active Directory has two main concept types: there are logical concepts and there are physical, and each in their way is treated separately.
Because Active Directory is a Directory Service, it needs a lookup system. That system is DNS, so if you are unfamiliar with that system, it would be good to read up on it.
And finally, don’t be scared of it. It may seem daunting now, especially if NT 4 is your only experience with a directory service. But there is a wealth of information out there about Active Directory and lots of people who have been working with it for a long time who can help and pass on information that will help you.
SLIDE TRANSITION: So, to help with that last point here are some place to start mining that information.
#28: KEY MESSAGE:
SLIDE BUILDS: None
SLIDE SCRIPT:
TechNet has it’s own Active Directory section under the Products and Technologies section. We’ve also put some of the more key links on this session’s resource page at that mail URL on the bottom.
SLIDE TRANSITION: If you want physical material, we have both MS Press books and also publications from other authors and vendors.
#29: Key Message: Talk about MS Press books and introduce the build-your-own-book feature.
SLIDE BUILDS: 1
SLIDE SCRIPT:
[BUILD 1] (Add book script here)
SLIDE TRANSITION:
ADDITIONAL INFORMATION/CROSS REFERENCE FOR PRESENTER:
#30: Key Message: Talk about the third Party books to show we do provide a balanced view in areas where our publications are diluted or we do not cover.
SLIDE BUILDS: None
SLIDE SCRIPT:
[BUILD 1] (Add book script here)
SLIDE TRANSITION:
ADDITIONAL INFORMATION/CROSS REFERENCE FOR PRESENTER:
#31: Microsoft Learning (formerly MS Training & Certification and MS Press, the book division) develops the courseware called Microsoft Official Curriculum (MOC), including MSDN Training courses, eLearning, MS Press Books, Workshops, Clinics, and Microsoft Skills Assessment. MOC is offered in instructor-led environments; it offers comprehensive training courses for both IT professionals and developers who build, support, and implement solutions using Microsoft products and technologies.
Please be sure to tell the audience that these training courses are related to the subject that was just covered in the slides, but they do not necessarily provide in-depth coverage of this exact subject as it may include other topics.
Anyone interested in more information about the course(s) listed should visit the Microsoft Training & Certification Web site at www.microsoft.com/learning and review the syllabus. All MOC courses are delivered by Microsoft’s premier training channel, Microsoft Certified Technical Education Centers (CTEC) and classes are taught by Microsoft Certified Trainers (MCT).
#32: OPENING TRANSITION: And now, for an exciting, new product also from Microsoft Learning…
KEY MESSAGE: Microsoft Skills Assessment
SLIDE SCRIPT: Microsoft Skills Assessment is a free online learning tool. It’s an easy way for IT professionals, developers, and trainers to check your skills. You can quickly check your skills for implementing or managing Microsoft product or business solutions. Just take a short, 30 question assessment and see how well you know your stuff.
Benefits include a Personalized Learning Plan, which includes links to Microsoft Official Curriculum, specific TechNet articles, Press books, and other Microsoft learning content. There’s also a way to measure how well you did compared with others who took the same assessment.
Microsoft Skills Assessment is an expanding learning platform. Available now are assessments for Windows Server 2003 including security and patch management, Exchange Server 2003, Windows Storage Server, Office 2003, and Visual Studio .NET.
SLIDE TRANSISTION: TechNet can also help prepare for Exams as well as a lot more, so what it is?
ADDITIONAL INFORMATION FOR PRESENTER:
http://www.microsoft.com/assessment
#33: KEY MESSAGE: Explain the MCSA program
SLIDE BUILDS: None
SLIDE SCRIPT: The Microsoft Certified Systems Administrator (MCSA) certification is designed for professionals who implement, manage, and troubleshoot existing network and system environments based on Microsoft Windows® Server 2003. Implementation responsibilities include installing and configuring parts of the systems. Management responsibilities include administering and supporting the systems.
For more information about the MCSA certification, please visit: www.microsoft.com/mcsa.
TYPICAL JOB TITLES FOR MCSA
Network Administrator, Systems Administrator, Information Technology Engineer, Information Systems Administrator, Network Technician
UPGRADE PATH FROM MCSA ON WINDOWS 2000
One exam required: Exam 70-292: Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSA Certified on Windows 2000
SLIDE TRANSISTION: That’s it. Signoff in you own way.
#34: KEY MESSAGE: Explain the MCSE program
SLIDE BUILDS: None
SLIDE SCRIPT: The Microsoft® Certified Systems Engineer (MCSE) credential is the premier certification for professionals who analyze the business requirements and design, plan, and implement the infrastructure for business solutions based on the Microsoft Windows Server System integrated server software. Implementation responsibilities include installing, configuring, and troubleshooting network systems. For more information about the MCSE certification, please visit: www.microsoft.com/mcse
MCSE candidates should have at least one year of experience planning, implementing, and analyzing business solutions with Microsoft products and technologies
UPGRADE FROM MCSE ON WINDOWS 2000
Two exams required
These 2 exams satisfy the core networking exams.
Exam 70-292: Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSA Certified on Windows 2000
Exam 70-296: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Environment for an MCSE Certified on Windows 2000
SLIDE TRANSISTION: That’s it. Signoff in you own way.
ADDITIONAL INFORMATION FOR PRESENTER:
http://www.microsoft.com/mcse
#35: KEY MESSAGE: Explain the MCSE and MCSA Security and Messaging Specialization program
SLIDE BUILDS: None
SLIDE SCRIPT:The Microsoft® Certified Systems Engineer and Systems Administrator specializations allow IT professionals to highlight specific expertise or technical focus within their job role.
Which Specializations are available?
There are two types of specializations available: Security and Messaging for Windows Server 2003.
SLIDE TRANSISTION: That’s it. Signoff in you own way.
ADDITIONAL INFORMATION FOR PRESENTER:
http://www.microsoft.com/Traincert/mcp/mcsa/messaging/windowsserver2003.asp
http://www.microsoft.com/Traincert/mcp/mcse/messaging/windowsserver2003.asp
#36: While the monthly subscription software is the most obvious component of TechNet, there’s also much more.
The TechNet website gives subscribers access to valuable information as well as threaded discussion pages and online seminars. Many subscribers use the Web as frequently as they use the software.
In the subscribers-only section, subscribers can access the Online Concierge Chat Support service—a Microsoft support special that can help them locate technical information quickly and easily. TechNet Plus subscribers also get access to our Managed Newsgroup Support Service. You can post questions in over 90 IT-related public newsgroups, and Microsoft will ensure that you get a response within 72 hours
TechNet Flash is a bi-weekly newsletter subscribers can register for. It gives them up-to-date information on the latest postings to the website
TechNet Events—TechNet subscribers have access to free events that explain how to use Microsoft products and technologies at a technical level
TechNet Communities ?????
#37: KEY MESSAGE: Purpose of this slide is to educate IT Pros on where to go and how to be a part of TechNet.
SLIDE BUILDS: None
SLIDE SCRIPT:
There is one place you should go to start: WW.MICROSOFT.COM/TECHNET.
There is one communication you should subscribe to: TechNet Flash. Published every other week for the IT Pro community, it focuses on news, information, resources and events.
Post questions on the discussion forum.
Subscribe online.
Look for TechNet branded events – feature.
SLIDE TRANSITION: Last slide in the deck. Round off however you like.
ADDITIONAL INFORMATION FOR PRESENTER: