Active Directory’s Ins and Outs

For a detailed look at Active Directory, peruse this technical reference.

If you haven’t worked with a directory service, Active Directory Services for Windows 2000 Technical Reference’s first chapter in Section One is a good place to start. It does a great job of explaining the business features of Active Directory (AD) and briefly touches on its technical aspects. But, be warned, this book isn’t written for beginners. After the first chapter the author quickly dives into how the AD service works, and the beginner may be lost by the quick transition from the first chapter to the second. (If you have worked with AD, however, Chapter 1 might prove a tad dull.)

If you’ve worked with NDS and LDAP and want to compare these with AD, this volume may be a bit disappointing. The author only briefly talks about LDAP, and NDS is discussed only in terms of migrating from NDS to AD. The author does, however, present a side-by-side comparison of AD and relational databases.

The rest of Section One is devoted to design considerations for a medium-size ore large environment. The section dedicates an entire chapter to AD and DNS, and this turned out to be one of the most concise, well-written references on Win2K DNS and its interoperability with AD that I’ve ever read. The author gives a detailed rundown on how the DNS process works within an AD environment.

Section Two really should be broken down into three subsections. The first subsection presents an in-depth description of AD that includes a planning guide; a good, but not detailed, introduction to Win2K security; an overview of the DC Promo process; and a detailed discussion of the AD Schema. The planning chapter presents useful information for those who aren’t sure where to start the deployment process. The security chapter offers a good overview but doesn’t fully cover security issues such as anonymous access, interoperability with NT 4.0 domains, or trusts.

The second subsection is dedicated to the practical implications of deploying AD. It’s a good starting point for those who are migrating from a previous NT 4.0 environment, NDS or Exchange 5.5. Meanwhile, the third subsection is a brief administrative guide covering what changes you can and can’t make after deployment. IntelliMirror and remote operating system installation also are covered.

Overall, this is a well-written, easy-to-read technical reference — as long as you have some experience with AD. The book doesn’t go into enough detail on subjects such as security and migration from NDS or Exchange 5.5. But, if nothing else, the DNS and Schema chapters make this book worth buying.

About the Author

Yolanda R. Reid, MCSE, CCNA, works closely with Win2K, Windows NT, and BackOffice products. As an employee of USI, her specialty is enterprise systems and designing Win2K infrastructures.

Featured

  • Microsoft Dismantles RedVDS Cybercrime Marketplace Linked to $40M in Phishing Fraud

    In a coordinated action spanning the United States and the United Kingdom, Microsoft’s Digital Crimes Unit (DCU) and international law enforcement collaborators have taken down RedVDS, a subscription based cybercrime platform tied to an estimated $40 million in fraud losses in the U.S. since March 2025.

  • Sound Wave Illustration

    CrowdStrike's Acquisition of SGNL Aims to Strengthen Identity Security

    CrowdStrike signs definitive agreement to purchase SGNL, an identity security specialist, in a deal valued at about $740 million.

  • Microsoft Acquires Osmos, Automating Data Engineering inside Fabric

    In a strategic move to reduce time-consuming manual data preparation, Microsoft has acquired Seattle-based startup Osmos, specializing in agentic AI for data engineering.

  • Linux Foundation Unites Major Tech Firms to Launch Agentic AI Foundation

    The Linux Foundation today announced the creation of a new collaborative initiative — the Agentic AI Foundation (AAIF) — bringing together major AI and cloud players such as Microsoft, OpenAI, Anthropic and other major tech companies.