Book Image

Mastering Active Directory

By : Dishan Francis
Book Image

Mastering Active Directory

By: Dishan Francis

Overview of this book

Active Directory is a centralized and standardized system that automates networked management of user data, security, and distributed resources and enables interoperation with other directories. If you are aware of Active Directory basics and want to gain expertise in it, this book is perfect for you. We will quickly go through the architecture and fundamentals of Active Directory and then dive deep into the core components, such as forests, domains, sites, trust relationships, OU, objects, attributes, DNS, and replication. We will then move on to AD schemas, global catalogs, LDAP, RODC, RMS, certificate authorities, group policies, and security best practices, which will help you gain a better understanding of objects and components and how they can be used effectively. We will also cover AD Domain Services and Federation Services for Windows Server 2016 and all their new features. Last but not least, you will learn how to manage your identity infrastructure for a hybrid-cloud setup. All this will help you design, plan, deploy, manage operations on, and troubleshoot your enterprise identity infrastructure in a secure, effective manner. Furthermore, I will guide you through automating administrative tasks using PowerShell cmdlets. Toward the end of the book, we will cover best practices and troubleshooting techniques that can be used to improve security and performance in an identity infrastructure.
Table of Contents (20 chapters)

Active Directory Security Best Practices

With this chapter, we are moving on to section four (the last section) of this book. This section includes chapters that cover Active Directory best practices, Active Directory troubleshooting, and extending an on-premises Active Directory infrastructure in Azure.

Infrastructure security is a very broad topic to discuss. It is not just security in Active Directory; it covers only a part of infrastructure security that is related to identities. At the same time, it is dependent on other security facts. As an example, before we protect the identities, we need to tighten the perimeter defense by setting up edge firewall rules to protect the internal network from outside threats.

Based on 2016 Internet Security Threat Report (https://www.symantec.com/security-center/threat-report) by Symantec, for a majority of the identity attacks, the main...