Book Image

Microsoft Application Virtualization Cookbook

Book Image

Microsoft Application Virtualization Cookbook

Overview of this book

Table of Contents (17 chapters)
Microsoft Application Virtualization Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Configuring Active Directory


This recipe shows you the Active Directory configuration on a domain controller that will be used through this cookbook. In addition, it shows the configuration of a Group Policy Object (GPO) that will allow traffic through the firewall of Windows servers.

Getting ready

It is assumed that you have access rights to create objects in Active Directory, including Organizational Units (OUs), security groups, and user accounts.

How to do it...

The following list shows you the fundamental tasks involved in this recipe and the tasks required to complete the recipe (all of the actions in this recipe will take place on the server with the hostname DC):

  • Creating required OUs

  • Creating required security groups

  • Creating required computer accounts and user accounts

  • Creating a new GPO and linking it to an OU

  • Configuring the GPO with a Windows firewall policy

The implementation of the preceding steps is as follows:

  1. Create the following OUs and pre-provision the computer accounts as shown:

  2. Under the Domain Groups OU, create the following Security Groups:

  3. Under Domain Users, create the following user accounts. In addition to this, add Sam Adams to the App-V Administrators Security Group option:

  4. Open the Group Policy Management Console (GPMC) console, expand the OU tree to show Domain Servers, and then right-click on the App-V Servers OU. From the menu that appears, click on Create a GPO in this domain, and Link it here.

  5. In the dialogue box that appears, enter Allow 440-442 as the name and click on OK.

  6. In the new window that appears, right-click on the policies title option, and from the menu that appears, click on Properties.

  7. Tick the Disable User Configuration settings checkbox and click on OK:

  8. Expand the tree structure to navigate to Computer Configuration | Policies | Windows Settings | Security Settings | Windows Firewall with Advanced Security | Windows Firewall with Advanced Security – LDAP.

  9. Right-click on Inbound Rules and select New Rule.

  10. In the window that appears, select the Port radio option and click on Next.

  11. Leave TCP selected, enter 440-442 in the Specific local ports box, and click on Next.

  12. Leave Allow the connection selected and click on Next.

  13. Remove the ticks from Private and Public to leave only Domain checked. Now, click on Next.

  14. Finally, give the policy the name Allow 440-442, and click on Finish.