Chapter and Appendix Overview
This self-paced training course combines notes, hands-on procedures, and review questions to teach you how to install, configure, administer, monitor, and troubleshoot Windows 2000 Active Directory. It is designed to be completed from beginning to end, but you can choose a customized track and complete only the sections that interest you. (See the next section, "Finding the Best Starting Point for You," for more information.) If you choose the customized track option, see the "Before You Begin" section in each chapter. Any hands-on procedures that require preliminary work from preceding chapters refer to the appropriate chapters.The book is divided into the following chapters:
The "About This Book" section contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete. Chapter 1, "Introduction to Microsoft Windows 2000," introduces Windows 2000. It includes overviews of the Windows 2000 operating system, Windows 2000 architecture, and Windows 2000 Directory Services. Chapter 2, "Introduction to Active Directory," introduces you to Active Directory components, including objects, domains, organizational units (OUs), trees, and forests. It also introduces you to Active Directory concepts, including the global catalog, replication, trust relationships, DNS namespaces, and naming conventions. Chapter 3, "Active Directory Administration Tasks and Tools," introduces you to the primary Active Directory administration tasks, including configuring Active Directory, administering users and groups, securing network resources, administering the desktop computing environment, auditing resources and events, and monitoring resources and events. It also introduces you to the Active Directory administration tools, including Microsoft Management Consoles (MMCs) and the Task Scheduler. Chapter 4, "Implementing Active Directory," walks you through the steps of implementing Active Directory, including planning, installation, determining operations master roles, and implementing an OU structure. Chapter 5, "DNS and Active Directory Integration," introduces you to DNS name resolution and zones. It also provides practice in configuring zones and discusses zone replication and transfer. The chapter concludes with information on troubleshooting an Active Directory DNS configuration. Chapter 6, "Configuring Sites," shows you how to configure site settings and inter-site replication. It provides troubleshooting information for problems you may encounter that relate to inter-site replication. This chapter also discusses the tasks necessary for configuring server settings. Chapter 7, "User Account Administration," introduces you to user accounts and how to plan them. You learn the procedures for creating domain and local user accounts and setting their properties, as well as for setting up user profiles and home directories. This chapter also covers user account maintenance, including disabling, enabling, renaming, deleting, and unlocking user accounts and resetting user passwords. Chapter 8, "Group Account Administration," provides you with a group planning strategy and procedures for creating groups. You learn about the default groups provided by Microsoft Windows 2000 and the groups to which administrators should be assigned. Chapter 9, "Securing Network Resources," introduces you to Microsoft Windows 2000 file system (NTFS) folder and file permissions. You learn how to assign NTFS folder and file permissions to user accounts and groups and how moving or copying files and folders affects NTFS file and folder permissions. The chapter concludes with information on troubleshooting common resource access problems. Chapter 10, "Administering Shared Folders," introduces you to shared folders and to how to plan them. You learn the procedures for sharing folder resources, securing them with permissions, and providing access to them. The chapter concludes with information on setting up the Microsoft distributed file system (Dfs) to provide users with convenient access to shared folders that are distributed throughout a network. Chapter 11, "Administering Active Directory," provides instruction on Active Directory administration tasks, including locating objects, assigning permissions to objects, publishing resources, moving objects within and between domains, delegating administrative control to OUs, backing up and restoring, and troubleshooting Active Directory. Chapter 12, "Administering Group Policy," introduces you to group policy concepts and implementation planning. You learn the procedures for implementing group policy. You also learn how to manage software and special folders using group policy. The chapter concludes with information on troubleshooting common group policy problems. Chapter 13, "Administering a Security Configuration," discusses the use of security settings to determine a system's security configuration, including auditing, using security logs, user rights, using security templates, and the Security Configuration and Analysis tool. The chapter concludes with information on troubleshooting a security configuration. Chapter 14, "Managing Active Directory Performance," provides details on the performance monitoring tools, support tools, and shared folder monitoring tools available to help you to manage Active Directory performance. Chapter 15, "Deploying Windows 2000 Using RIS," introduces you to RIS. Procedures walk you through the steps for implementing and administering RIS. The chapter concludes with answers to frequently asked RIS questions and information on troubleshooting RIS problems. Appendix A, "Questions and Answers," lists all of the practice and review questions from the book, showing suggested answers. Appendix B, "Installing and Configuring the DHCP Service," contains basic instructions for installing and configuring the Dynamic Host Configuration Protocol (DHCP) service in preparation for the use of RIS. The Glossary lists and defines the terms associated with your study of Windows 2000 Active Directory.
Finding the Best Starting Point for You
Because this book is self-paced, you can skip some lessons and revisit them later. But note that you must complete the setup instructions in this chapter before you can perform procedures in the other chapters. Use the following table to find the best starting point for you.
If You | Follow This Learning Path |
---|---|
Are preparing to take the Microsoft Certified Professional exam 70-217, Implementing and Administering a Microsoft Windows 2000 Directory Services Infrastructure | Read the "Getting Started" section and follow the setup procedure in the "Setup Procedures" section. Then work through Chapters 1 through 15, in order. |
Want to review information about specific topics from the exam | Use the "Where to Find Specific Skills in This Book" section that follows this table. |
Where to Find Specific Skills in This Book
The following tables provide a list of the skills measured on certification exam 70-217, Implementing and Administering a Microsoft Windows 2000 Directory Services Infrastructure. The table provides the skill and where in this book you will find the lesson relating to that skill.NOTE
Exam skills are subject to change without prior notice and at the sole
discretion of Microsoft.Installing, Configuring, and Troubleshooting Active Directory
Skill Being Measured | Location in Book |
---|---|
Install, Configure, and Troubleshoot the Components of Active Directory | |
Install Active Directory | Chapter 4, Lesson 2 |
Create sites | Chapter 6, Lesson 1 |
Create subnets | Chapter 6, Lesson 1 |
Create site links | Chapter 6, Lesson 1 |
Create site link bridges | Chapter 6, Lesson 2 |
Create connection objects | Chapter 6, Lesson 2 |
Install, Configure, and Troubleshoot the Components of Active Directory | |
Create global catalog servers | Chapter 6, Lesson 4 |
Move server objects between sites | Chapter 6, Lesson 4 |
Transfer Operations Master roles | Chapter 4, Lesson 3 |
Verify Active Directory installation | Chapter 4, Lesson 2 |
Implement an OU structure | Chapter 4, Lesson 4 |
Back Up and Restore Active Directory | |
Perform an authoritative restore of Active Directory | Chapter 11, Lesson 6 |
Recover from a system failure | Chapter 11, Lesson 7 |
Installing, Configuring, Managing, Monitoring, and Troubleshooting DNS for Active Directory
Skill Being Measured | Location in Book |
---|---|
Install, Configure, and Troubleshoot DNS for Active Directory | |
Integrate an Active Directory DNS with a non-Active Directory DNS | Chapter 5, Lessons 2 and 4 |
Configure zones for dynamic updates | Chapter 5, Lessons 2 and 4 |
Manage, Monitor, and Troubleshoot DNS | |
Manage replication of DNS data | Chapter 5, Lessons 3 and 4 |
Installing, Configuring, Managing, Monitoring, Optimizing, and Troubleshooting Change and Configuration Management
Skill Being Measured | Location in Book |
---|---|
Implement and Troubleshoot Group Policy | |
Create a group policy object (GPO) | Chapter 12, Lessons 3 and 6 |
Link an existing GPO | Chapter 12, Lessons 3 and 6 |
Delegate administrative control of group policy | Chapter 12, Lessons 3 and 6 |
Modify group policy inheritance | Chapter 12, Lessons 3 and 6 |
Filter group policy settings by associating security groups to GPOs | Chapter 12, Lessons 3 and 6 |
Modify group policy | Chapter 12, Lessons 3 and 6 |
Manage and Troubleshoot User Environments by Using Group Policy | |
Control user environments by using Administrative Templates | Chapter 12, Lessons 3 and 6 |
Assign script policies to users and computers | Chapter 12, Lessons 3 and 6 |
Manage and Troubleshoot Software by Using Group Policy | |
Deploy software by using group policy | Chapter 12, Lesson 4 |
Maintain software by using group policy | Chapter 12, Lesson 4 |
Configure deployment options | Chapter 12, Lesson 4 |
Troubleshoot common problems that occur during software deployment | Chapter 12, Lesson 6 |
Manage Network Configuration by Using Group Policy | Chapter 12, Lesson 5 |
Deploy Windows 2000 by Using RIS | |
Install an image on an RIS client computer | Chapter 15, Lesson 2 |
Create an RIS boot disk | Chapter 15, Lesson 2 |
Configure remote installation options | Chapter 15, Lesson 2 |
Troubleshoot RIS problems | Chapter 15, Lesson 4 |
Manage images for performing remote installations | Chapter 15, Lesson 3 |
Configure RIS Security | |
Authorize an RIS server | Chapter 15, Lesson 3 |
Grant computer account creation rights | Chapter 15, Lesson 3 |
Prestage RIS client computers for added security and load balancing | Chapter 15, Lesson 3 |
Managing, Monitoring, and Optimizing the Components of Active Directory
Skill Being Measured | Location in Book |
---|---|
Manage Active Directory Objects | |
Move Active Directory objects | Chapter 11, Lesson 4 |
Publish resources in Active Directory | Chapter 11, Lesson 3 |
Locate objects in Active Directory | Chapter 11, Lesson 1 |
Create and manage accounts manually or by scripting | Chapter 7, Lessons 3, 4, and 5Chapter 8, Lessons 3, 4, and 5 |
Control access to Active Directory objects | Chapter 11, Lesson 2 |
Delegate administrative control of objects in Active Directory | Chapter 11, Lesson 5 |
Manage Active Directory Performance | |
Monitor, maintain, and troubleshoot domain controller performance | Chapter 14, Lessons 1, 2, and 3 |
Monitor, maintain, and troubleshoot Active Directory components | Chapter 14, Lessons 1, 2, and 3 |
Manage and Troubleshoot Active Directory Replication | |
Manage inter-site replication | Chapter 6, Lessons 1, 2, and 3 |
Manage intra-site replication | Chapter 6, Lessons 1 and 3 |
Configuring, Managing, Monitoring, and Troubleshooting Active Directory Security Solutions
Skill Being Measured | Location in Book |
---|---|
Configure and Troubleshoot Security in a Directory Services Infrastructure | |
Apply security policies by using group policy | Chapter 13, Lessons 1, 3, 4, and 7 |
Create, analyze, and modify security configurations by using Security Configuration and Analysis and Security Templates | Chapter 13, Lessons 5, 6, and 7 |
Implement an audit policy | Chapter 13, Lessons 2 and 7 |
Monitor and Analyze Security Events | Chapter 13, Lesson 3 |