Active Directory’s Ins and Outs

For a detailed look at Active Directory, peruse this technical reference.

If you haven’t worked with a directory service, Active Directory Services for Windows 2000 Technical Reference’s first chapter in Section One is a good place to start. It does a great job of explaining the business features of Active Directory (AD) and briefly touches on its technical aspects. But, be warned, this book isn’t written for beginners. After the first chapter the author quickly dives into how the AD service works, and the beginner may be lost by the quick transition from the first chapter to the second. (If you have worked with AD, however, Chapter 1 might prove a tad dull.)

If you’ve worked with NDS and LDAP and want to compare these with AD, this volume may be a bit disappointing. The author only briefly talks about LDAP, and NDS is discussed only in terms of migrating from NDS to AD. The author does, however, present a side-by-side comparison of AD and relational databases.

The rest of Section One is devoted to design considerations for a medium-size ore large environment. The section dedicates an entire chapter to AD and DNS, and this turned out to be one of the most concise, well-written references on Win2K DNS and its interoperability with AD that I’ve ever read. The author gives a detailed rundown on how the DNS process works within an AD environment.

Section Two really should be broken down into three subsections. The first subsection presents an in-depth description of AD that includes a planning guide; a good, but not detailed, introduction to Win2K security; an overview of the DC Promo process; and a detailed discussion of the AD Schema. The planning chapter presents useful information for those who aren’t sure where to start the deployment process. The security chapter offers a good overview but doesn’t fully cover security issues such as anonymous access, interoperability with NT 4.0 domains, or trusts.

The second subsection is dedicated to the practical implications of deploying AD. It’s a good starting point for those who are migrating from a previous NT 4.0 environment, NDS or Exchange 5.5. Meanwhile, the third subsection is a brief administrative guide covering what changes you can and can’t make after deployment. IntelliMirror and remote operating system installation also are covered.

Overall, this is a well-written, easy-to-read technical reference — as long as you have some experience with AD. The book doesn’t go into enough detail on subjects such as security and migration from NDS or Exchange 5.5. But, if nothing else, the DNS and Schema chapters make this book worth buying.

About the Author

Yolanda R. Reid, MCSE, CCNA, works closely with Win2K, Windows NT, and BackOffice products. As an employee of USI, her specialty is enterprise systems and designing Win2K infrastructures.

Featured

  • Windows 365 Cloud Apps Now Available for Public Preview

    Microsoft announced this week that Windows 365 Cloud Apps are now available for public preview. This aims to allow IT administrators to stream individual Windows applications from the cloud, removing the need to assign Cloud PCs to every user.

  • Report: Security Initiatives Can't Keep Pace with Cloud, AI Boom

    The increasingly fast adoption of hybrid, multicloud, and AI systems is easily outgrowing existing security measures, according to a recent global survey by the Cloud Security Alliance (CSA) and exposure management firm Tenable.

  • World Map Image

    Microsoft Taps Nebius in $17B AI Infrastructure Deal To Alleviate Cloud Strain

    Microsoft has signed a five-year, $17.4 billion agreement with Amsterdam-based Nebius Group to expand its AI computing capabilities through third-party GPU infrastructure.

  • Microsoft Brings Copilot AI Into Viva Engage

    Microsoft 365 Copilot in Viva Engage is now generally available, extending Copilot's AI-powered assistant capabilities deeper into the Viva platform.