Active Directory(8.0-8.8)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Policy

A set of rules and guidelines that establish the way that business is conducted within an organization.

2
New cards

Workgroup

Microsoft's implementation of peer-to-peer networking.

3
New cards

Domain

An administratively defined collection of network resources that share a common directory database and security policies.

4
New cards

Domain

A domain is an administratively defined collection of network resources that share a common directory database and common security policies. The domain is the basic administrative unit of an Active Directory structure.

  • Database information is replicated (shared or copied) within a domain.

  • Security settings are not shared between domains.

  • Each domain maintains its own set of relationships with other domains.

  • Domains are identified using Domain Name System (DNS) names.

    • The common name is the domain name itself (for example, CorpNet).

    • The distinguished name includes the common domain name along with the top-level DNS domain name (for example, CorpNet.xyz).

Depending on the network structure and requirements, the entire network might be represented by a single domain with millions of objects. It is also possible that the network might require multiple domains.

5
New cards

Organizational unit (OU)

An organizational unit is like a folder that subdivides and organizes network resources within a domain. An organizational unit:

  • Is a container object.

  • Can contain other OUs or any type of leaf object (such as users, computers, and printers).

  • Can logically organize network resources.

  • Simplifies security administration.

6
New cards

Built-in containers

Like OUs, generic built-in containers are used to organize Active Directory objects. Built-in container objects differ from other containers in that they:

  • Are created by default.

  • Cannot be created, moved, renamed, or deleted.

  • Have very few editable properties.

7
New cards

Objects

Within Active Directory, each resource is identified as an object. Common objects include:

  • Users

  • Groups

  • Computers

You should know the following about objects:

  • Each object contains attributes that include information about the object itself such as a user's name, phone number, and email address. This information is used for locating and securing resources.

  • Active Directory uses DNS for locating and naming objects.

  • Container objects hold other objects. These can be either other containers or leaf objects.

8
New cards

Domain controller

A domain controller is a Windows server that holds a copy of the Active Directory database.

  • A domain controller is a member of only one domain.

  • A domain can contain multiple domain controllers. Each domain controller holds a copy of the Active Directory database.

  • Any domain controller can make changes to the Active Directory database.

  • Replication is the process of copying changes made to the Active Directory database between all domain controllers in the domain.

9
New cards

Domain

A collection of network resources that share a common directory database.

10
New cards

Organizational unit (OU)

A folder-like container that organizes network resources.

11
New cards

Built-in containers

Default containers used to organize Active Directory objects that cannot be deleted.

12
New cards

Object

A resource within Active Directory.

13
New cards

Domain controller

A Windows server that holds a copy of the Active Directory database.

14
New cards

Full

backs up all files (even those that have not changed)

15
New cards

Incremental

backs up every file that has changed since the last full or incremental backup.

16
New cards

Differential

Backs up every file that has changed since the last full backup

17
New cards

Synthetic

Compares the data found in the last full backup with the current content and uploads only the changes. 

18
New cards

Point-to-Point Tunneling Protocol (PPTP) 

PPTP was developed by Microsoft as one of the first VPN protocols.

PPTP:  

  • Uses standard authentication protocols, such as CHAP and PAP. 

  • Supports only TCP/IP. 

  • Is supported by most operating systems and servers. 

  • Uses TCP port 1723. 

19
New cards

Layer Two Tunneling Protocol (L2TP) 

L2TP is an open standard for secure multiprotocol routing.

L2TP:  

  • Supports multiple protocols (not just IP). 

  • Uses IPsec for encryption. 

  • Is not supported by older operating systems. 

  • Uses TCP port 1701 and UDP port 500. 

20
New cards

Internet Protocol Security (IPsec) 

IPsec provides authentication and encryption. You can use it in conjunction with L2TP or by itself as a VPN solution. IPsec includes the following three protocols for authentication, data encryption, and connection negotiation:  

  • Authentication Header (AH) enables authentication with IPsec. 

  • Encapsulating Security Payload (ESP) provides data encryption. 

  • Internet Key Exchange (IKE) negotiates the connection. 

IPsec can secure the following types of communications:  

  • Host-to-host communications within a LAN. 

  • VPN communications through the internet, either by itself or in conjunction with the L2TP VPN protocol. 

21
New cards

Secure Sockets Layer (SSL) 

The SSL protocol has long been used to secure traffic generated by IP protocols such as HTTP, FTP, and email. You can also use SSL as a VPN solution, typically in a remote access scenario. SSL:  

  • Authenticates the server to the client using public key cryptography and digital certificates. 

  • Encrypts the entire communication session. 

  • Uses port 443, which is already open on most firewalls. 

22
New cards

Generic Routing Encapsulation (GRE) 

GRE is a tunneling protocol developed by Cisco. You can use GRE to route any Layer 3 protocol across an IP network. GRE:  

  • Creates a tunnel between two routers. 

  • Encapsulates packets by adding a GRE header and a new IP header to the original packet. 

  • Does not offer any type of encryption. 

  • Can be paired with other protocols, such as IPsec or PPTP, to create a secure VPN connection. 

23
New cards

Operating system updates

Each operating system includes an update feature that keeps the operating system current. Updates may include fixes for known bugs, patches for known security risks, and the addition of new features. 

24
New cards

Driver updates

If the hardware manufacturer hasn't registered a driver with Microsoft, updates for the driver aren't made available through the Windows Update service.  
 
If this is the case for a device in your system, check the hardware manufacturer's website. It should provide updated versions of the driver that you can download and install. You should always use the latest versions of the drivers for the hardware in your system. 

25
New cards

Application updates 

For third-party applications, visit the manufacturer's website and check for updates or configure the application to update itself.  
 
Many applications include an automatic update feature that periodically goes to the manufacturer's website to see if an update is available. Usually, an automatic update feature will prompt you to download and install updates it finds. 

26
New cards

Firmware updates

Firmware is software embedded in the flash memory of a hardware device. Like all software, the firmware needs to be updated.  
 
For update instructions, visit the manufacturer's website. When updating firmware, back up the current system firmware first. Most firmware update utilities provide an option to back up the existing firmware before the update in case something goes wrong. 

27
New cards

Pause updates 

You can pause updates for one week

28
New cards

Update history

You can access the following logs under Update history.  

  • Feature updates 

  • Quality updates 

  • Driver updates 

  • Definition updates 

  • Other updates 

You can also uninstall updates. 

29
New cards

Advanced options

The following update options are available:  

  • Receive updates for other Microsoft products (toggle on/off). 

  • Get me up to date (toggle on/off). 

  • Download updates over metered connections (toggle on/off). 

  • Notify me when a restart is required to finish updating (on/off). 

  • Active hours. The device will not be restarted for updates between set hours. 

30
New cards

Windows Insider Program 

The Windows Insider Program is a software testing program. Users who are running valid instances of Windows can register to receive pre-release builds of the operating system.  
 
There are three insider settings to choose from:  

  • Dev channel (recommended for highly technical users). 

  • Beta channel (recommended for most users). 

  • Release preview (recommended for commercial users). 

31
New cards
32
New cards
33
New cards
34
New cards