Day-4 Active Directory

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

Day4

ACTIVE DIRECTORY: Active Directory is a directory service that is used to store


information about various network resources and nodes(server) throughout a
domain. i.e, AD is a directory service which contains information of all user
accounts on a network.
Purpose:
It provides user logon & authentication services using protocol. Enable
authorised users to easily locate network resources.
What are the rules/roles of AD?
AD is having 5 Rules / FSMO(Flexible Single Master OS) rules.
Schema Master: Schema is a set of rules. Schema can be classified into:
Classes(a template, used to create an object[user, group, computer]) &
Attributes(properties of an object[user name, phone number, address, profile
path, logon hrs]).
Domain Naming Master: Checks & Maintains the domain names in whole forest. It
responsible for adding, removing, renaming the domain names in whole forest.
RID Master: Relative ID master, assigns unique ids to the objects which are
created in the domain.
PDC Emulator: Primary Domain Controller, it process all password updates for
clients. It synchronizes time between the domain controllers. Emulator means, it
will create the environment to collect your client/server.
Infrastructure Master: The infrastructure master is responsible for updating the
group-to-user references whenever the members of groups are renamed or
changed. When you rename or move a member of a group, the group may
temporarily appear.
What is Domain Controllers?
Domain Controller is a server on a Microsoft Windows or Windows NT network. It
is responsible for to allow host access to Windows domain resources.
(OR)
Domain Controller authenticates and authorizes all users and computers in a
Windows domain type networkassigning and enforcing security policies for all
computers and installing or updating software. For example, when a user logs
into a computer that is part of a Windows domain, Active Directory checks the
submitted password and determines whether the user is a system
administrator or normal user.

Prepared By Prudhvi

What is Protocol?
Protocol means, it contains some set of rules and regulations. It can allow 2
electronic items to connect & also exchange the information with one another.
Also, it regulates the data transmission all over the network devices. Protocol
decides error checking, how the data sending/transmitting is going
correctly/not...etc. Some protocols like, FTP, TCP/IP, SMTP, HTTP...etc
What is FTP?
File Transfer Protocol (FTP) is a network protocol, used to transfer files from
one host to another host over the Internet.
What is SMTP?
SMTP stands for Simple Mail Transfer Protocol. It's a set of communication
guidelines that allow software to transmit email over the Internet. Most email
software is designed to use SMTP for communication purposes when sending
email, and It only works for outgoing messages.
What is HTTP?
Hypertext Transfer Protocol, the data transfer protocol used on the World Wide
Web. HTTP Is a request-response protocol.
What is TCP/IP?
Transmission
Control
Protocol/Internet
Protocol, it
is
communications
protocols used to connect hosts on the Internet. TCP/IP is built into
the UNIX operating system and is used by the Internet. Even network operating
systems that have their own protocols, such as Netware, also support TCP/IP.
What is Profiles?
It is a user environment and it contains personal settings of user like, documents,
desktop settings, start menu icons, shortcuts, application data, downloads,
contacts, pictures, music, videos. It is 3 types.
Local Profile: A local user profile is created the first time when he logon to a
computer and is stored on computers local hard disks.
Roaming Profile: A roaming user profile is created by your system admins & is
stored on a server. If any changes on this profile are updated on server.
Mandatory Profile: It is type of roaming profile. These are fixed profiles in which
user changes will not be saved. Only admin can make the changes.

Prepared By Prudhvi

What are the permissions?


It is a type of access granted to a user, group/computer to access some
resources(read, write, delete or create new one). Permissions can be applied to
these resources like, files, folders, printers. It is 2 types.
Security Level: It can be implemented only on NTFS partitions. NTFS permissions
can be set on drivers, folders, & files. Security permissions are, modify, read,
write & execute...etc.
Share Level Permissions: It can be implemented on NTFS & FAT partitions. It can
be set on drives & share folders but not on files. It can accessed from network.
Note: NTFS means, New Technology File System, is a file system developed
by Microsoft Corporation for its windows operating systems. FAT means, File
Allocation Table, FAT file systems are still commonly found on floppy
disks, memory cards, Pen drives.
What is FLPD?
FLPD means First Level Problem Description. If you receive any disk space issue,
then logon to server, here we need to raise the disk space.

Prepared By Prudhvi

You might also like