AD Child Domains By: Joan Carter 05/29/2003. Who can bring up a child domain in AD.ASU.EDU?  Campus/college/VP level units  Considerations: Is there.

Slides:



Advertisements
Similar presentations
Auditing Microsoft Active Directory
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Creating and Configuring Group Policy
Module 4: Implementing User, Group, and Computer Accounts
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 1: Introduction to Active Directory.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 4 Chapter 4: Planning the Active Directory and Security.
7.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Windows 2000 Arizona State University Windows 2000 Infrastructure Mehran Yahya Information Technology Patricia M. Schneider Information Technology – East.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW  Describe the process of adding a computer to.
Understanding Active Directory
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
Chapter 7 WORKING WITH GROUPS.
ADVANCED MICROSOFT ACTIVE DIRECTORY CONCEPTS
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Module 2 Creating Active Directory ® Domain Services User and Computer Objects.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
8.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 8: Introducing Computer Accounts.
Managing Active Directory Domain Services Objects
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter 7: WORKING WITH GROUPS
Designing Active Directory for Security
Module 7: Fundamentals of Administering Windows Server 2008.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Windows 2000 Presented to CCC by Pat Schneider May 23, 2001.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Microsoft ® Official Course Module 3 Managing Active Directory Domain Services Objects.
Company Confidential 1 A Course on Global Catalog And Flexible Single Master Operations (Fsmo) Roles Prepared for: *Stars* New Horizons Certified Professional.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Operations Master / FSMO Roles in Active Directory : Suhail Ashfaq Butt.
Global Catalog and Flexible Single Master Operations (FSMO) Roles
Module 1: Implementing Active Directory ® Domain Services.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
OVERVIEW OF ACTIVE DIRECTORY
Introduction to Active Directory
Module 1: Introduction to Active Directory
MIS Chapter 41 Chapter 4 – Implementing and Managing Group and Computer Accounts MIS 431 – Created Spring 2006.
11 UPGRADING AND MIGRATING TO WINDOWS SERVER 2003 Chapter 12.
Global Catalog and Flexible Single Master Operations (FSMO) Roles BAI516.
Module 8: Planning for Windows Server 2008 Active Directory Services.
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Windows Enterprise Services.  Introductions  UNM Directory Services  RSAT  Organizational Units (OU)  Active Directory Groups  Naming Convention.
Module 2: Implementing an Active Directory Forest and Domain Structure.
Global Catalog and Flexible Single Master Operations (FSMO) Roles
(ITI310) SESSIONS 6-7-8: Active Directory.
Active Directory Administration
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Microsoft Windows Server 2003 Active Directory Infrastructure
Global Catalog and Flexible Single Master Operations (FSMO) Roles
Unit 6 NT1330 Client-Server Networking II Date: 7/19/2016
Presentation transcript:

AD Child Domains By: Joan Carter 05/29/2003

Who can bring up a child domain in AD.ASU.EDU?  Campus/college/VP level units  Considerations: Is there a business purpose that requires the creation of another domain in the forest? Would there be a better use of resources?

Do we want a child domain?  We: Need to manage our own accounts Have particular needs for password or security settings that are different from ASURITE domain’s settings Are geographically or network challenged Want our users to use/access resources anywhere in AD.ASU.EDU without an additional logon. Want the ability to utilize the university structure and processes in place (e.g., ASURITE accounts, Student accounts, administrative processes used in the ASU AD forest, etc.).

What would my responsibilities be?  Maintain 2 domain controllers with current hardware service agreements, in a secure location  Provide 7/24 support (on-call for non-business hours)  Provide a list of DC administrators with contact info to IT- Main  Demonstrate ability to backup/restore AD components.  Coordinate scheduled maintenance on DC’s. Bring one DC down during any maintenance in the event a problem occurs. Run DCDIAG prior to and immediately after any maintenance to verify that communication with the rest of the domain is intact

What would my responsibilities be?  Provide immediate notification to IT-Main of unscheduled DC outages  Provide appropriate support during AD.ASU.EDU Active Directory schema updates as follows: Be on-call. Bring one DC down during update  Keep DC’s and Servers up-to-date (security and anti- virus)  Use secure account management practices

What would my responsibilities be?  Comply with restriction on Generic (lab or multiple- users-per-account) domain accounts. Generic accounts can be created on member servers or locally on individual workstations Test, Administrator, and Guest accounts can be handled through Computer Accounts "Exception" process. Service accounts can be created locally or domain-wide. NOTE: If a unit has a need for generic accounts that cannot be handled via the above methods, they may want to create their own forest to accommodate this need.

What would my responsibilities be?  Perform all local domain administration and maintenance  Perform authoritative Active Directory restore for objects in their domain.

What are IT’s responsibilities?  Information Technology is responsible for maintaining the stability and integrity of the AD.ASU.EDU, ASURITE.AD.ASU.EDU and STUDENT.AD.ASU.EDU domains for the University.

What are IT’s responsibilities?  Hardware/software maintenance and support  Troubleshooting problems  Backup/restore of AD objects  Schema changes  Performance and event monitoring  DNS support  Account administration  Delegation of authority  7/24 on-call support

Which functions are controlled by Enterprise Admins only?  DCPROMO  DC DNS authority (ad.asu.edu zone)  Schema updates  Enterprise-wide service accounts  DFS root?  Site Creation  IAS/RAS Authorization  RIS Authorization  DHCP authorization

What does this mean to me? Plan ahead!! Your lack of planning should not become IT’s emergency!

What about the other child-domain administrator’s – can they be trusted?  Domain administrators don’t inherently have rights to other domains.  There are a few security holes that can be exploited only by domain administrators, but… All are university employees that have been given this authority by their college/campus/VP unit.

What else do I need to plan/decide? LOTS!!

Decision Points  Do I have the resources available for a child- domain (i.e., the extra hardware and manpower for managing it)?  Do I have the resources available for a child- domain in the development environment (i.e., the extra hardware and manpower for managing it)?

Decision Points  What level to join the domain? (i.e., child to AD, child to another domain, peer to AD).  What will I name the domain? (i.e., xxx.ad.asu.edu)  Which DC’s will have which FSMO roles?  Which DC’s will be Global Catalog servers  Will we need to change the DNS suffix on any of our servers/workstations? How will we accomplish this?

Decision Points  Upgrade DC’s in-place or rebuild and migrate?  Migrate groups from resource domains, or re-create?  Create a separate Site or join the Main Site?  What will the OU Structure look like?

Decision Points  Delegation issues: User account delegation – who has permissions to manage user account attributes, what can and can’t they do? Computer object delegation – who has permissions to manage computer objects?

Decision Points  OU delegation – what should OU admins be able to do in their own OU? Create/delete computer objects? Create/delete contact objects? Create/delete Group objects (Local Domain, Global, Universal -- all as a Distribution or Security group)? Create/delete sub OU’s ? Note: OU’s are created with the ability to create user accounts. A script can be written to create sub-OU’s with proper delegated permissions

Decision Points Create/delete printer objects (publishes print shares)? Create/delete user objects? Create/delete shared folder objects (publishes existing shares in their OU)? Create/delete Group Policy objects? Assign others the rights/privileges to manage objects in their OU (i.e., add others to their OUAdmin group)? Have different levels of permissions for different OUAdmins?

Decision Points  What default settings will we need on user accounts and computer objects?  What will our naming convention be for user accounts, OU’s, groups, computer objects, etc.?  Will I need to use GPO’s for anything? If so, will I use loopback GPO’s or will all my domain users reside in the same OU’s as the computers they use?  Do I use NetID for DHCP or Microsoft DHCP? If I use Microsoft DHCP, will I want integrated dynamic DNS?

Decision Points  What scripts are needed? Now? Later? User account management Computer object management User ACL’s User attribute changes (i.e., UPN, W2K login name, others?) OU creation (with correct security for OUAdmins, others) Sub-OU creation.  Use monitoring tools or manual processes?

Upgrade or build new?  Upgrade benefits - keep existing accounts/group memberships no effect on users (i.e., they keep their accounts/passwords)  Upgrade problems – SID history information is everywhere (some associated latency) Some systems may have misc unexplainable problems?

Upgrade or build new?  Build new benefits – No SID histories, unless ADMT is used. No unexplained system problems due to upgrade  Build new problems – User impact (i.e., accounts/passwords) Re-creation of groups & memberships unless ADMT is used.

What’s the plan? A general overview  Scenario 1 – Authentication and Resource domain migration Upgrade Authentication domain BDC DCPROMO – make new child domain Build new DC for second DC (replaces old PDC) Move FSMO roles to re-built DC, and now rebuild original DC Select DC’s for FSMO roles and GC placement Re-create trusts to resource domains

What’s the plan? A general overview Use ADMT to migrate groups and/or local resource domain users to new child domain Upgrade/rebuild member servers and join to new child domain If upgrade of resource domain DC’s is necessary rather than rebuild (in order to keep data, permissions, attributes, etc), upgrade and place in a FAKE W2K forest. Then DCPROMO out of the forest and make the system a member server.

What’s the plan? A general overview  Scenario 2 – Single NT domain (authentication and resources) Upgrade BDC to W2K DCPROMO – make new child domain Build new DC for second DC Upgrade/rebuild member servers Move FSMO roles to re-built DC, and now rebuild original DC Select DC’s for FSMO roles and GC placement

Test, test, test  Set up a copy of your domain(s) in the development environment to test your migration. (xxx.tad.asu.edu)  Test all facets of the upgrade/migration before you work on your production environment!

Prepare, Coordinate, and DCPROMO  Create a task list to make sure you don’t forget anything!  Be sure to coordinate all functions with IT- Main!

Verify and Monitor - Tools  ClonePrincipal - A command-line tool used for user, group, and computer object migration.  Active Directory Migration Tool (ADMT) – A GUI based Active Directory Migration tool (ADMT) to migrate users, groups, and computers from one domain to another, and to analyze the migration impact both before and after the actual migration process.

Verify and Monitor - Tools  NETDIAG - Tests the state and functionality of various network connectivity and components on a network client.  DCDIAG – Tests the state of various Domain Controller functions and communication.  NETDOM - Enables administrators to remotely add, delete, and reset computer objects in a domain.  REPLMON - Displays replication topology, status and performance of Active Directory domain controllers.

Verify and Monitor - Tools  GPResult - This command-line tool displays information about the result Group Policy has had on the current computer and logged-on user.  GPOTool - This command-line tool allows you to check the health of the Group Policy objects on domain controllers.

Management and Maintenance  Replication monitoring  Object maintenance  Delegation of authority - ows_ou/ ows_ou/

AD Child Domains Questions?

AD Forests at ASU

Why would I want my own forest?  High security No other domains have access to your resources  Total control Enterprise Admin functions (e.g., schema updates)  Little coordination needed with IT DNS Kerberos LDAP

What’s the down side?  No trust with ad.asu.edu Exchange users would need to have separate credentials No cross-forest authentication, i.e., resources in ad.asu.edu forest may not be available to your users.  No automated user/group management provided by IT  Additional management/resources are needed to maintain

AD Forests at ASU Questions?