Active Directory Network - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Active Directory Network

The Experts below are selected from a list of 39 Experts worldwide ranked by ideXlab platform

Active Directory Network – Free Register to Access Experts & Abstracts

Panek William – One of the best experts on this subject based on the ideXlab platform.

  • MCTS: (Exams 70-640, 70-642 and 70-643)
    John Wiley & Sons Inc, 2011
    Co-Authors: Panek William
    Abstract:

    The must-have study guide for all three Windows Server 2008 R2 MCTS examsNetwork administrators boost their value to their employers with certification, and Microsoft?s three Windows Server 2008 exams offer certification specialties in configuring Active Directory, Network Infrastructure, and Applications Infrastructure. With complete coverage to prepare you for all three exams, this comprehensive study guide has three times the value. Real-world scenarios and hands-on exercises supplement the information to facilitate learning.The three Windows Server 2008 R2 exams (70-640, 70-642, and 70-64

William Panek – One of the best experts on this subject based on the ideXlab platform.

  • MCTS Windows Server 2008 R2 Complete Study Guide: Exams 70-640, 70-642 and 70-643
    , 2011
    Co-Authors: William Panek
    Abstract:

    The must-have study guide for all three Windows Server 2008 R2 MCTS examsNetwork administrators boost their value to their employers with certification, and Microsoft?s three Windows Server 2008 exams offer certification specialties in configuring Active Directory, Network Infrastructure, and Applications Infrastructure. With complete coverage to prepare you for all three exams, this comprehensive study guide has three times the value. Real-world scenarios and hands-on exercises supplement the information to facilitate learning.The three Windows Server 2008 R2 exams (70-640, 70-642, and 70-643) are the first step in achieving Microsoft Certified Technology Specialist status; this complete study guide covers all threeIncludes information on installing and configuring Microsoft exchange servers; monitoring and reporting; configuring recipient and public folders, exchange infrastructure, disaster recovery, addressing and services, name resolution, Network access, and remote desktop services; monitoring and managing Network infrastructure; and deploying serversSupplemented with plenty of hands-on exercises and real-world scenarios to prepare you for the exam and the work beyondAnyone planning to take exam 70-640, 70-642, or 70-643 will be better prepared with MCTS: Windows Server 2008 R2 Complete Study Guide.

Thomas W. Shinder – One of the best experts on this subject based on the ideXlab platform.

  • Defending the Network with ISA Server—and Beyond
    Dr. Tom Shinder's ISA Server and Beyond, 2002
    Co-Authors: Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal
    Abstract:

    This chapter provides an overview of Microsoft ISA Server’s features and functionality, installation tips, and how to update the ISA Server and clients with Service Pack 1. It includes new information about incorporating ISA Server into the Network design, using Application Center 2000 to manage ISA Servers in a non-Active Directory Network, running ISA Server on Windows .NET Server, and information about some of the many third party software packages that can be added to ISA Server to enhance its functionality. This chapter also discusses major Network security issues, which are often encountered by the administrators of Windows-based Networks in the enterprise, including the use of Windows’ built-in security features, such as the default access control settings, Security Configuration Toolset, and the Encrypting File System (EFS). Other security considerations that are discussed include the use of smart cards to authenticate users on the Network, securing 802.1 wireless Networks, and providing better Web security when using IIS (internet information services) as the Web server.

  • Chapter 8 – Secure Communication
    Configuring Windows 2000 without Active Directory, 2001
    Co-Authors: Carol Bailey, Thomas W. Shinder
    Abstract:

    Publisher Summary This chapter covers the practical side of implementing the Internet Protocol Security (IPSec) with Windows 2000 when it is being used in the Active Airectory environment. In this environment, the default authentication of Kerberos cannot be used and computers cannot automatically receive a certificate. Even though the user is not running an Active Directory Network, there’s no reason why he or she cannot make full use of the IPSec to secure data as it travels over the Network. It’s a matter of choice how securely the user chooses to enforce this security and the complexity of when and how the data will be secured. This chapter covers the utilities the user may require when configuring and testing the IPSec, how to use them, and how to configure the IPSec policies. This chapter explores the built-in IPSec policies and the components that make up these policies so the user can modify them, or build his or her own custom policies. Building custom policies requires some knowledge of the IPSec algorithms and the workings of IPSec key exchanges.

  • Chapter 7 – Internet Services
    Configuring Windows 2000 without Active Directory, 2001
    Co-Authors: Carol Bailey, Thomas W. Shinder
    Abstract:

    Publisher Summary This chapter covers the improvements and new features to be found in the Internet Information Service (IIS5) and its complementing services—Microsoft’s certificate services. Much of the Windows 2000 documentation on the new certificate services concentrates on running an enterprise certificate authority (CAs) to grant certificates. Because Enterprise CAs are supported only in an Active Directory environment, this chapter concentrates on standalone CAs only. It is certainly true that running certificate services integrated within an Active Directory Network makes it much easier to administer and deploy certificates. But one can still take advantages of certificate services outside Active Directory, and one may consider this to be a more secure solution anyway. The trick is to know what one can do—and the way to do it—when one is not running Active Directory. IIS5 is much easier to install with Windows 2000 because it’s built into the base operating system. A clean installation of Windows 2000 Server and advanced server will automatically install the IIS, although it’s not automatically installed on Windows 2000 Professional.

Radek Kuchta – One of the best experts on this subject based on the ideXlab platform.

  • Implementation of an Advanced Authentication Method within Microsoft Active Directory Network Services
    2010 6th International Conference on Wireless and Mobile Communications, 2010
    Co-Authors: Jaroslav Kadlec, David Jaros, Radek Kuchta
    Abstract:

    This paper describes a new approach for developing and implementing an advanced authentication method within Active Directory Network services. For advance authentication process a new type of user multi-factor authentication based on the classical three-factor authentication extended by the position information and time is described in this paper. The main objectives of our applied research are extended security features for more robust and more secure user’s authentication process. Application scenario of advanced multi-factor authentication method within corporate Networks based on the Microsoft Active Directory Network services is presented. Five different factors for user’s authentication provide more secured access control layer for current corporate Networks with Microsoft Active Directory with only small implementation costs.

Mika Seitsonen – One of the best experts on this subject based on the ideXlab platform.

  • Inside Active Directory: A System Administrator’s Guide, Second Edition (Microsoft Windows Server System)
    , 2004
    Co-Authors: Sakari Kouti, Mika Seitsonen
    Abstract:

    Praise for the First Edition “Trust me on this one…if you’re an Active Directory engineer or architect, this is the book you need. It’s the companion that’s going to help you keep your job if you’re up in the middle of the night trying to understand how something works or why it’s not working. It’s truly an amazing book.” -Scott Rachui, MCSE and Senior Active Directory Engineer, author of MCSE Exchange Server 5.5 for Dummies “This is the best book on Windows 2000 that I have read and one of the best computer books I have ever read. The most unique quality is the excellent explanation of how to use scripting to maximize your results and minimize your effort. This book is especially well suited to the enterprise audience that has to deploy many servers (100+) and not just 1-10. If you have even a small bit of programming experience, you will really appreciate the in-depth explanations of Windows 2000 under the covers.” -Eric Chipko “Wow!! I love this book. I’d trade all my books covering Active Directory for this book in a second. The material is covered at a depth that I haven’t seen in any other book-and I’ve looked at most of them. The material is presented in a straightforward manner that doesn’t put you to sleep. An NT4 administrator could easily read this book and become an expert at Active Directory. I especially appreciated the chapter on Active Directory security.” -Brian Arkills, author of LDAP Directories ExplainedPraise for the Second Edition “If you are committed and really desire to know what makes Active Directory tick-and with it the backbone of the latest, and greatest, generation of Windows Network Operating Systems-then there is no better guide to get you there than this book. Inside Active Directory has no equal in the breadth, depth, and scope of its value to a technical practitioner.” -Rick Kingslan, Microsoft MVP, Directory Services “Kouti and Seitsonen provide excellent coverage of topics a lot of people have difficulty understanding and setting up properly. This book supplies you with sound background theory so you can understand these concepts and at the same time gives just the right amount of detail to actually accomplish what you are trying to do.” -Harold McFarland, Editor, Readers Preference Reviews “The style of this book is very appealing. It gives sufficient detail for the experienced administrator and explains what is happening ‘behind the scenes’ at each step, which is extremely helpful when problems arise. An excellent read and an essential component for any skilled administrator!” -Jeff Dunkelberger, Solutions Architect “An outstanding refresh of an already great book, Inside Active Directory, Second Edition, should be in the toolbox of any serious Active Directory administrator, architect, or developer. Inside Active Directory is one of the five books I refer to on a weekly basis. Thanks to the authors for all their hard work and dedication.” -Joe Richards, Microsoft MVP, Windows Server/Active DirectoryThe most practical, comprehensive, and highly praised guide to Active Directory has now been fully updated for Windows Server 2003. The second edition of Inside Active Directory: A System Administrator’s Guide offers a definitive reference to the design, architecture, installation, and management of Active Directory, the cornerstone technology within Windows 2000 and Windows Server 2003 distributed Networks. This new edition-based on the final release software of Windows Server 2003-emphasizes security and covers all the new features, including enhancements in replication and Group Policy, forest trusts, functional levels, and working with dynamic objects.Inside this core reference, you’ll find practical strategies for managing Active Directory, along with detailed instructions for efficiently administering your entire Network operating environment. You will find detailed coverage of the following: Site basics and replication topologies, processes, and diagnostics Group Policy architecture, planning, management, and diagnostics Security and permission architecture and management scenarios Administration scripts, from basic concepts to advanced topics, including more than 50 sample scripts New cross-forest security features, including Selective Authentication, SID Filtering, and Name Suffix Routing A detailed drill-down to the schema, and practical strategies and examples for extending it Using Active Directory hierarchies to implement an effective structure for your NetworkThis is an indispensable reference for anyone working with Active Directory. Network operating system novices will gain a solid understanding of Active Directory, while administrators experienced in NT, NetWare, or UNIX will learn how to utilize their current skills in Active Directory. Experienced Windows 2000/Windows Server 2003 professionals will pick up advanced techniques, and developers will benefit strongly from the architecture topics.